Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-09-23ZscalerNiraj Shivtarkar, Satyam Singh
BunnyLoader, the newest Malware-as-a-Service
BunnyLoader
2023-09-06ZscalerAvinash Kumar, Niraj Shivtarkar
Steal-It Campaign
Mocky LNK
2023-07-07ZscalerNiraj Shivtarkar, Preet Kamal
The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region
2023-03-31ZscalerMeghraj Nandanwar, Niraj Shivtarkar, Rohit Hegde
3CX Supply Chain Attack Campaign Campaign Analysis
3CX Backdoor
2023-02-24ZscalerAvinash Kumar, Niraj Shivtarkar
Snip3 Crypter Reveals New TTPs Over Time
DCRat Quasar RAT
2023-02-14ZscalerNiraj Shivtarkar, Shatak Jain
Havoc Across the Cyberspace
Havoc
2022-10-21ZscalerAvinash Kumar, Niraj Shivtarkar
WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group
WarHawk
2022-08-18ZscalerNiraj Shivtarkar
Grandoreiro Banking Trojan with New TTPs Targeting Various Industry Verticals
Grandoreiro
2022-06-09ZscalerAvinash Kumar, Niraj Shivtarkar
Lyceum .NET DNS Backdoor
Lyceum .NET DNS Backdoor
2022-04-06ZscalerAvinash Kumar, Niraj Shivtarkar
FFDroider Stealer Targeting Social Media Platform Users
FFDroider