Click here to download all references as Bib-File.•
2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
2020-08-19
⋅
SecurityLiterate
⋅
Chantay’s Resume: Investigating a CV-Themed ZLoader Malware Zloader |
2020-04-19
⋅
SecurityLiterate
⋅
Reversing Ryuk: A Technical Analysis of Ryuk Ransomware Ryuk |