Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2025-12-22Medium Ireneusz TarnowskiIreneusz Tarnowski
Operational Analysis of Communication Channels in Mobile RCS
SpyFRPTunnel
2025-10-20Medium Deriv-TechShantanu Ghumade
How a fake AI recruiter delivers five staged malware disguised as a dream job
BeaverTail OtterCookie InvisibleFerret
2025-10-18Medium 0xzyadelzyatZyad Elzyat
PureLogs Stealer: Complete Malware Analysis & CTF Walkthrough
PureLogs Stealer
2025-10-02Medium BI.ZONEBI.ZONE
Cavalry Werewolf raids Russia’s public sector with trusted relationship attacks
FoalShell StallionRAT YoroTrooper
2025-09-22Medium Mr.AnyThinkMr.AnyThink
Hunting For TamperedChef Infostealer
TamperedChef
2025-09-12Medium (@zyadlzyatsoc)Zyad Elzyat
XWorm Malware Analysis: SOC & IR Perspective on Persistence, C2, and Anti-Analysis Tactics
XWorm
2025-08-18Medium RaghavtiResearchBeGoodToAll
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook
Qilin AgendaCrypt
2025-08-01Medium RaghavtiResearchBeGoodToAll
https://medium.com/p/862eea4a2db4
2025-07-27Medium RaghavtiResearchBeGoodToAll
Lumma Stealer — A Proliferating Threat in the Cybercrime Landscape
Lumma Stealer
2025-07-17Medium Ireneusz TarnowskiIreneusz Tarnowski
Dissecting the ClickFix User-Execution Attack and Its Sophisticated Persistence via ADS
Cobalt Strike
2025-07-01Medium walmartglobaltechJason Reaves
Janela RAT and a stealer extension delivered together
JanelaRAT
2025-06-29Medium Sapir TwigSapir Twig
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat
DarkGate
2025-05-31Medium (@mvaks)mvaks
Crocodilus in the wild: Mapping the campaign in Poland
Crocodilus
2025-05-28Medium (@mvaks)mvaks
Bombardino Crocodilo in Poland — analysis of IKO Lokaty mobile malware campaign
Crocodilus
2025-05-15Medium b.magnezi0xMrMagnezi
Ave Maria Malware Analysis
Ave Maria
2025-04-23Medium b.magnezi0xMrMagnezi
AsyncRAT Malware Analysis
AsyncRAT
2025-04-10Medium TRAC LabsTRAC Labs
Autopsy of a Failed Stealer: StealC v2
Stealc