Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-24ZscalerSudeep Singh, Yin Hong Chang
COLDRIVER Updates Arsenal with BAITSWITCH and SIMPLEFIX
NOROBOT
2025-09-14GeniansGenians
AI-Driven Deepfake Military ID Fraud Campaign by Kimsuky APT
2025-08-05DefentiveDefentive Threat Research
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT
Ghost RAT
2025-07-28Wiz.ioMerav Bar
TraderTraitor: Deep Dive
GolangGhost Manuscrypt RN Stealer DRATzarus GolangGhost PostNapTea Volgmer wAgentTea
2025-07-24SYGNIASygnia Team
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage
2025-07-16ShindanPaul Viard
Crocodilus - A deep dive into its structure and capabilities
Crocodilus
2025-07-11Authentic8A8 Team
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw
NightEagle
2025-05-29FortinetJohn Simmons, Xiaopeng Zhang
Deep Dive into a Dumped Malware without a PE Header
2025-05-01Github (VenzoV)VenzoV
Deep Dive Fog ransomware
Fog
2025-04-25HiSolutionsMaik Würth, Mateo Mrvelj, Nicolas Sprenger
Rolling in the Deep(Web): Lazarus Tsunami
tsunami
2025-04-21TrellixMohideen Abdul Khader
Unmasking the Evolving Threat: A Deep Dive into the Latest Version of Lumma InfoStealer with Code Flow Obfuscation
Lumma Stealer
2025-04-16VirusTotalVirusTotal
b804ab085f7cf9ee546d586b36ebbeb73f874205b8fae048760dee78375ddf40
Unidentified 121
2025-04-08TrustwaveNikita Kazymirskyi, Serhii Melnyk
A deep Dive into the Leaked Black Basta Chat Logs
Black Basta Black Basta
2025-03-28Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun
2025-03-14K7 SecurityBaran S
Android Banking Trojan – OctoV2, masquerading as Deepseek AI
Coper
2025-03-03DeXposeM4lcode
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
PureLogs Stealer
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery
2025-01-150x0d4y0x0d4y
[BabbleLoader] A Deep Dive into EDR and Machine Learning-Based Endpoint Protection Evasion
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2024-12-11SublimeSublime Security
Xloader deep dive: Link-based malware delivery via SharePoint impersonation
Xloader Formbook