Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2
2020-08-19SecurityLiterateKyle Cucci
Chantay’s Resume: Investigating a CV-Themed ZLoader Malware
Zloader
2020-04-19SecurityLiterateKyle Cucci
Reversing Ryuk: A Technical Analysis of Ryuk Ransomware
Ryuk