Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-050x3oBADAbdullah Islam
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
Payload
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient
2026-03-10AhnLabASEC
Analysis of the Green Blood v2.0 ransomware, which is decryptable
GreenBlood
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-04EG-FinCirtEG-FinCirt Malware Analysis team
Remcos RAT Operations: How Attackers Gain and Maintain Control
Remcos
2026-02-27IntrinsecGilbert Kallenborn
Analysis of AuraStealer, an emerging infostealer
Aura Stealer
2026-02-17ANY.RUNANY.RUN
LATAM Businesses Hit by XWorm via Fake Financial Receipts: Full Campaign Analysis
XWorm
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-19OpenSourceMalwarePaul McCarty
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware
OtterCandy
2026-01-16sysdigSysdig Threat Research Team
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits
VoidLink
2026-01-14Jamf BlogNir Avraham, Shen Yuan
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware
Predator
2026-01-14S2W Inc.Byeongyeol An
Detailed Analysis of DragonForce Ransomware
DragonForce
2026-01-13ANY.RUNANY.RUN
CastleLoader Analysis: A Deep Dive into Stealthy Loader Targeting Government Sector
CASTLELOADER
2026-01-12sec0wnMo Bustami
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
2026-01-04sec0wnMo Bustami
From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell
Cobalt Strike