Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-27MandiantDiana Ion, Rommel Joven, Yash Gupta
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
UNC6032
2024-01-30MandiantDiana Ion, Jae Young Kim, Muhammad Umair, Panagiotis Antoniou, Yash Gupta
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths
QUIETBOARD Vetta Loader UNC4990