Click here to download all references as Bib-File.•
2025-08-28
⋅
Gdata
⋅
AppSuite PDF Editor Backdoor: A Detailed Technical Analysis TamperedChef |
2025-08-19
⋅
IBM X-Force
⋅
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs QuirkyLoader |
2025-08-18
⋅
Medium RaghavtiResearch
⋅
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook Qilin AgendaCrypt |
2025-08-18
⋅
Trellix
⋅
A Comprehensive Analysis of HijackLoader and Its Infection Chain HijackLoader |
2025-08-12
⋅
bluecyber
⋅
Analysis of a ClickFix malware attack Vidar |
2025-08-08
⋅
AhnLab
⋅
Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project Rhadamanthys SmartLoader |
2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
2025-07-29
⋅
Foresiet
⋅
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown Aura Stealer |
2025-07-23
⋅
bluecyber
⋅
APT32 Malware: An In-Depth Analysis OceanLotus |
2025-07-16
⋅
Reverse The Malware
⋅
Analysis Fake reCAPTCHA ( Powershell Stage ) |
2025-07-16
⋅
Reverse The Malware
⋅
Analysis Malicious reCAPTCHA |
2025-07-16
⋅
Reverse The Malware
⋅
Analysis CryptoMiner Sample ( Script Based ) |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious HTA Dropper . |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Second Stage of Double Encoded Malicious Powershell |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Double Encoded Malicious Powershell |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell ( Part 4 ) |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 3 ) |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 2 ) |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 1 ) |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Shellcode ( HTA as Dropper ) Part 2 |