Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-19Cyber GeeksCyberMasterV
A Technical Analysis of the BackMyData Ransomware Used to Attack Hospitals in Romania
Phobos
2023-09-27Cyber GeeksVlad Pasca
A Deep Dive into Brute Ratel C4 payloads – Part 2
Brute Ratel C4
2023-08-31Cyber GeeksCyberMasterV
A Deep Dive into Brute Ratel C4 Payloads
Brute Ratel C4
2022-10-31Cyber GeeksVlad Pasca
A Technical Analysis of Pegasus for Android - Part 3
Chrysaor
2022-09-27Cyber GeeksVlad Pasca
A technical analysis of Pegasus for Android – Part 2
Chrysaor
2022-09-22Cyber GeeksVlad Pasca
A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder
LockBit
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
ChromeLoader Browser Hijacker
Choziosi
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-07-26CYBER GEEKS All Things InfosecCyberMasterV
HOW to Analyze Linux Malware - A Case Study of Symbiote
Symbiote
2022-07-26Cyber GeeksVlad Pasca
How To Analyze Linux Malware – A Case Study Of Symbiote
Symbiote
2022-06-30CYBER GEEKS All Things InfosecCyberMasterV
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-30Cyber Geeks (CyberMasterV)Vlad Pasca
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-04-27CYBER GEEKS All Things InfosecCyberMasterV
Reverse Engineering PsExec for fun and knowledge
2022-03-28Cyber Geeks (CyberMasterV)Vlad Pasca
A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla
TinyTurla
2022-02-28Cyber GeeksVlad Pasca
How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization
2022-01-31Cyber GeeksVlad Pasca
A Detailed Analysis Of Lazarus APT Malware Disguised As Notepad++ Shell Extension
AnchorMTea
2021-11-30CYBER GEEKS All Things InfosecCyberMasterV
Just another analysis of the njRAT malware – A step-by-step approach
NjRAT
2021-10-31CYBER GEEKS All Things InfosecCyberMasterV
A detailed analysis of the STOP/Djvu Ransomware
STOP
2021-09-29CYBER GEEKS All Things InfosecCyberMasterV
How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear
MiniDuke
2021-08-03Cyber GeeksCyberMasterV
A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy
SkinnyBoy
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide
2021-01-25CYBER GEEKS All Things InfosecCyberMasterV
A detailed analysis of ELMER Backdoor used by APT16
ELMER
2020-12-26CYBER GEEKS All Things InfosecCyberMasterV
Analyzing APT19 malware using a step-by-step method
Derusbi
2020-11-27CYBER GEEKS All Things InfosecCyberMasterV
Dissecting APT21 samples using a step-by-step approach
NetTraveler