Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-18ZynapOscar Gallego
Zynap’s Next-Gen Sandbox Redefines Automatic Malware Analysis
Black Basta HijackLoader
2026-05-17Github (zanez)Irvin Martínez González
Analysis on Malware that attacks Israel's Water treatment facilities
ZionSiphon
2026-05-05EG-FinCirtEG-FinCirt Malware Analysis team
Payload Ransomware: In-depth technical analysis
Payload
2026-05-05EG-FinCirtEG-FinCirt Malware Analysis team
Payload Ransomware: In-depth technical analysis
Payload
2026-05-01Github (zanez)Irvin Martínez González
NotPetya Malware Analysis - Bye, boot partition. I'll miss you
EternalPetya
2026-04-18Github (zanez)Irvin Martínez González
WannaCry Malware Analysis - How YOU Could have Saved the World
WannaCryptor
2026-04-16DarktraceCalum Hall, Ryan Traill
Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems
ZionSiphon
2026-04-050x3oBADAbdullah Islam
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
Payload
2026-03-30CERT.PLCERT.PL
FvncBot Campaign Analysis
SpyFRPTunnel
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-24ZynapAlberto Marín
Defensive Rootkits: Engineering Kernel-Level Malware Analysis from Ring 0
Xloader CloudEyE Lumma Stealer SmokeLoader
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient
2026-03-12ANY.RUNANY.RUN
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
MicroStealer
2026-03-10AhnLabASEC
Analysis of the Green Blood v2.0 ransomware, which is decryptable
GreenBlood
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-04EG-FinCirtEG-FinCirt Malware Analysis team
Remcos RAT Operations: How Attackers Gain and Maintain Control
Remcos
2026-02-27IntrinsecGilbert Kallenborn
Analysis of AuraStealer, an emerging infostealer
Aura Stealer
2026-02-17ANY.RUNANY.RUN
LATAM Businesses Hit by XWorm via Fake Financial Receipts: Full Campaign Analysis
XWorm
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper