Click here to download all references as Bib-File.•
2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |
2025-03-06
⋅
Outpost24
⋅
Unveiling EncryptHub: Analysis of a multi-stage malware campaign Rhadamanthys |
2025-03-04
⋅
⋅
Genians
⋅
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack Quasar RAT |
2025-03-01
⋅
ZW01f
⋅
An in-depth analysis of APT37’s latest campaign RokRAT |
2025-02-27
⋅
Medium b.magnezi
⋅
NanoCore Malware Analysis Nanocore RAT |
2025-02-19
⋅
0x0d4y
⋅
Technical Analysis of Lockbit4.0 Evasion Tales LockBit |
2025-01-27
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer Lumma Stealer |
2025-01-23
⋅
ThreatMon
⋅
Helldown Ransomware Malware Analysis Report HellDown |
2025-01-16
⋅
Fortinet
⋅
Analysis of Threat Actor Data Posting Belsen Group |
2025-01-15
⋅
⋅
Qianxin
⋅
Zombies Never Die: Analysis of the Current Situation of Large Botnet AIRASHI AIRASHI kitty-soks5 |
2025-01-08
⋅
ThreatMon
⋅
Akira Ransomware Group & Malware Analysis Report Akira |
2024-12-26
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software ComeBacker |
2024-12-18
⋅
Kaspersky Labs
⋅
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations Babuk LockBit Revenge RAT SparkRAT Ukrainian Cyber Alliance |
2024-12-16
⋅
Zscaler
⋅
Technical Analysis of RiseLoader RiseLoader |
2024-12-13
⋅
Medium 0x_b0mb3r
⋅
Technical Analysis: Magecart Skimmer magecart |
2024-12-02
⋅
Medium b.magnezi
⋅
LokiBot Malware Analysis Loki Password Stealer (PWS) |
2024-11-30
⋅
Technical Evolution
⋅
REKOOBE APT-31 Linux Backdoor Analysis Rekoobe |
2024-11-19
⋅
Trend Micro
⋅
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Cobalt Strike LODEINFO NOOPDOOR MirrorFace |
2024-11-18
⋅
TEHTRIS
⋅
Cryptbot downloader: A deep cryptanalysis CryptBot |
2024-11-18
⋅
Logpoint
⋅
Exploring Strela Stealer: Initial Payload Analysis and Insights StrelaStealer |