Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-04Medium (@DCSO_CyTec)Denis Szadkowski, Johann Aydinbas, Maike Orlikowski, Paul van Ramesdonk
Unransomware: From Zero to Full Recovery in a Blink
Akira
2024-10-28Medium shaddy43Shayan Ahmed Khan
Emotet Malware Analysis
Emotet
2024-09-25Medium b.magnezi0xMrMagnezi
Lumma Stealer - Malware Analysis
Lumma Stealer
2024-07-14Medium b.magnezi0xMrMagnezi
Malware Analysis - Rhadamanthys
Rhadamanthys
2024-06-19Medium walmartglobaltechJason Reaves, Joshua Platt
Spectre (SPC) v9 Campaigns and Updates
Spectre Rat
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-13Medium (@zyadlzyatsoc)Zyad Elzyat
Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation
Latrodectus
2024-06-06Medium b.magnezi0xMrMagnezi
Agent Tesla Analysis
Agent Tesla
2024-06-06Medium b.magnezi0xMrMagnezi
Remcos RAT Analysis
Remcos
2024-05-29Medium (DoingFedTime)DoingFedTime
80-000 records exposed in shell data breach by threat actor
Threat Actor 888
2024-05-08Medium (montysecurity)montysecurity
From OSINT to Disk: Wave Stealer Analysis
Wave Stealer
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-04-19Medium MITRE-EngenuityCharles Clancy, Lex Crumpton
Advanced Cyber Threats Impact Even the Most Prepared
2024-03-26Medium zyadlzyatsocZyad Elzyat
Comprehensive Analysis of EMOTET Malware: Part 1
Emotet
2024-03-19Medium b.magnezi0xMrMagnezi
Malware Analysis NjRat
NjRAT
2024-03-19Medium (@DCSO_CyTec)DCSO CyTec
How Rogue ISPs Tamper With Geofeeds
2024-03-13Medium walmartglobaltechJason Reaves, Joshua Platt
NewBot Loader
NewBot Loader
2024-03-05Medium walmartglobaltechJason Reaves, Joshua Platt
Unknown Nim Loader using PSBypassCLM
Unidentified 115 (Nim Loader)
2024-03-01Medium b.magnezi0xMrMagnezi
Malware Analysis - Cobalt Strike
Cobalt Strike
2024-02-22Medium b.magnezi0xMrMagnezi
Malware Analysis - XWorm
XWorm