Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-20K7 SecurityShanmugasundharam E
Python Ciphering : Delving into Evil Ant’s Ransomware’s Tactics
Evil Ant
2024-02-14K7 SecuritySudeep Waingankar
Zloader Strikes Back
Zloader
2024-02-09K7 SecuritySuresh Reddy
The Phoenix Rises Again
2024-02-08K7 SecurityUma Madasamy
Unmasking-the-dot-stealer
2024-01-30K7 SecurityDeepa B
Python’s Byte: The Rise of Scripted Ransomware
2024-01-04K7 SecuritySaikumaravel
Qakbot Returns
QakBot
2023-12-27K7 SecurityGaurav Yadav
Mallox Evading AMSI
TargetCompany
2023-11-30K7 SecurityArunkumar
Uncovering the Serpent
Serpent Serpent Stealer
2023-09-08K7 SecuritySudeep Waingankar
RomCom RAT: Not Your Typical Love Story
ROMCOM RAT RomCom
2023-07-25K7 SecurityVigneshwaran P
Akira’s Play with Linux
Akira
2023-06-30K7 SecurityDhanush
Cobalt Strike’s Deployment with Hardware Breakpoint for AMSI Bypass
Cobalt Strike
2023-06-01K7 SecurityRahul R
Encrypted Chaos: Analysis of Crytox Ransomware
Crytox
2023-05-10K7 SecurityBaran S
spynote
SpyNote
2023-04-21K7 SecuritySudeep Waingankar
MuddyWaters back with DarkBit
DarkBit
2023-03-30K7 SecurityLathashree K
GoatRAT Attacks Automated Payment Systems
GoatRAT
2023-02-23K7 SecurityVigneshwaran P
The DoNot APT
DONOT
2023-02-08K7 SecurityBaran S
Play Store App Serves Coper Via GitHub
Coper
2023-01-04K7 SecuritySaikumaravel
Pupy RAT hiding under WerFault’s cover
pupy
2022-12-20K7 SecurityMellvin S
Lazarus APT’s Operation Interception Uses Signed Binary
Interception
2022-12-07K7 SecurityLathashree K
An upsurge of new Android Banking Trojan “Zanubis”
Zanubis