Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-14Jamf BlogNir Avraham, Shen Yuan
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware
Predator
2026-01-14S2W Inc.Byeongyeol An
Detailed Analysis of DragonForce Ransomware
DragonForce
2026-01-12sec0wnMo Bustami
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
2026-01-04sec0wnMo Bustami
From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell
Cobalt Strike
2025-12-27bluecyberNigmaz
APT Earth Baxia - Charon Ransomware: An In-Depth Analysis
Charon
2025-12-22Medium Ireneusz TarnowskiIreneusz Tarnowski
Operational Analysis of Communication Channels in Mobile RCS
SpyFRPTunnel
2025-12-21GeniansGenians
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks
RokRAT
2025-12-10Trend MicroAshish Verma, Deep Patel, Jack Walsh, Lucas Silva, Peter Girnus
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-11-25kienmanowar Blogm4n0w4r, Tran Trung Kien
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes
VIP Keylogger
2025-11-24ISH TecnologiaCaique Barqueta, Ícaro César
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer.
2025-11-17AhnLabASEC Analysis Team
NKNShell Malware Distributed via VPN Website
Larva-24010
2025-10-25MandarNaik016Mandar Naik
Malware Analysis - VIP Keylogger - Part 2
VIP Keylogger
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz
2025-10-18Medium 0xzyadelzyatZyad Elzyat
PureLogs Stealer: Complete Malware Analysis & CTF Walkthrough
PureLogs Stealer
2025-10-14SynacktivTheo Letailleur
LinkPro: eBPF rootkit analysis
LinkPro
2025-10-14SynacktivTheo Letailleur
LinkPro: analysis of an eBPF rootkit
LinkPro vGet
2025-10-13LogpressoHwang Min-kyung
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS
2025-10-13NCSC UKNCSC UK
Malware Analysis Report: RayInitiator & LINE VIPER