Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-28Wiz.ioMerav Bar
TraderTraitor: Deep Dive
GolangGhost Manuscrypt RN Stealer DRATzarus GolangGhost PostNapTea Volgmer wAgentTea
2025-07-24SYGNIASygnia Team
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage
2025-07-16ShindanPaul Viard
Crocodilus - A deep dive into its structure and capabilities
Crocodilus
2025-05-29FortinetJohn Simmons, Xiaopeng Zhang
Deep Dive into a Dumped Malware without a PE Header
2025-05-01Github (VenzoV)VenzoV
Deep Dive Fog ransomware
Fog
2025-04-25HiSolutionsMaik Würth, Mateo Mrvelj, Nicolas Sprenger
Rolling in the Deep(Web): Lazarus Tsunami
tsunami
2025-04-21TrellixMohideen Abdul Khader
Unmasking the Evolving Threat: A Deep Dive into the Latest Version of Lumma InfoStealer with Code Flow Obfuscation
Lumma Stealer
2025-04-16VirusTotalVirusTotal
b804ab085f7cf9ee546d586b36ebbeb73f874205b8fae048760dee78375ddf40
Unidentified 121
2025-04-08TrustwaveNikita Kazymirskyi, Serhii Melnyk
A deep Dive into the Leaked Black Basta Chat Logs
Black Basta Black Basta
2025-03-28Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun
2025-03-14K7 SecurityBaran S
Android Banking Trojan – OctoV2, masquerading as Deepseek AI
Coper
2025-03-03DeXposeM4lcode
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
PureLogs Stealer
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery
2025-01-150x0d4y0x0d4y
[BabbleLoader] A Deep Dive into EDR and Machine Learning-Based Endpoint Protection Evasion
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2024-12-11SublimeSublime Security
Xloader deep dive: Link-based malware delivery via SharePoint impersonation
Xloader Formbook
2024-11-18TEHTRISTEHTRIS
Cryptbot downloader: A deep cryptanalysis
CryptBot
2024-11-15VolexityCallum Roxan, Charlie Gardner, Paul Rascagnères
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
lightSpy LIGHTSPY BH_A006 DEEPDATA DEEPPOST BrazenBamboo
2024-11-12BlackberryBlackBerry Research & Intelligence Team
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
DEEPDATA
2024-11-04Israel National Cyber Directorate (INCD)Israel National Cyber Directorate (INCD)
Deep Drive Analysis of the BeaverTail Infostealer
BeaverTail