Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-01Github (zanez)Irvin Martínez González
NotPetya Malware Analysis - Bye, boot partition. I'll miss you
EternalPetya
2026-04-18Github (zanez)Irvin Martínez González
WannaCry Malware Analysis - How YOU Could have Saved the World
WannaCryptor
2026-04-16DarktraceCalum Hall, Ryan Traill
Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems
ZionSiphon
2026-04-050x3oBADAbdullah Islam
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
Payload
2026-03-30CERT.PLCERT.PL
FvncBot Campaign Analysis
SpyFRPTunnel
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-24ZynapAlberto Marín
Defensive Rootkits: Engineering Kernel-Level Malware Analysis from Ring 0
Xloader CloudEyE Lumma Stealer SmokeLoader
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient
2026-03-12ANY.RUNANY.RUN
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
MicroStealer
2026-03-10AhnLabASEC
Analysis of the Green Blood v2.0 ransomware, which is decryptable
GreenBlood
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-04EG-FinCirtEG-FinCirt Malware Analysis team
Remcos RAT Operations: How Attackers Gain and Maintain Control
Remcos
2026-02-27IntrinsecGilbert Kallenborn
Analysis of AuraStealer, an emerging infostealer
Aura Stealer
2026-02-17ANY.RUNANY.RUN
LATAM Businesses Hit by XWorm via Fake Financial Receipts: Full Campaign Analysis
XWorm
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-19OpenSourceMalwarePaul McCarty
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware
OtterCandy