Click here to download all references as Bib-File.
2022-08-30 ⋅ CYBER GEEKS All Things Infosec ⋅ ChromeLoader Browser Hijacker Choziosi |
2022-08-29 ⋅ CYBER GEEKS All Things Infosec ⋅ A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-07-26 ⋅ CYBER GEEKS All Things Infosec ⋅ HOW to Analyze Linux Malware - A Case Study of Symbiote Symbiote |
2022-06-30 ⋅ CYBER GEEKS All Things Infosec ⋅ How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |
2022-04-27 ⋅ CYBER GEEKS All Things Infosec ⋅ Reverse Engineering PsExec for fun and knowledge |
2021-11-30 ⋅ CYBER GEEKS All Things Infosec ⋅ Just another analysis of the njRAT malware – A step-by-step approach NjRAT |
2021-10-31 ⋅ CYBER GEEKS All Things Infosec ⋅ A detailed analysis of the STOP/Djvu Ransomware STOP |
2021-09-29 ⋅ CYBER GEEKS All Things Infosec ⋅ How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear MiniDuke |
2021-06-14 ⋅ CYBER GEEKS All Things Infosec ⋅ A Step-by-Step Analysis of a New Version of DarkSide Ransomware DarkSide |
2021-01-25 ⋅ CYBER GEEKS All Things Infosec ⋅ A detailed analysis of ELMER Backdoor used by APT16 ELMER |
2020-12-26 ⋅ CYBER GEEKS All Things Infosec ⋅ Analyzing APT19 malware using a step-by-step method Derusbi |
2020-11-27 ⋅ CYBER GEEKS All Things Infosec ⋅ Dissecting APT21 samples using a step-by-step approach NetTraveler |