Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-07Perception PointArthur Vaiselbuh
Evasive ZIP Concatenation: Trojan Targets Windows Users
SmokeLoader
2024-03-18Perception PointAriel Davidpur, Peleg Cabra
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT
NetSupportManager RAT
2023-07-16Perception PointIgal Lytzki
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators
Mispadu
2023-02-06Perception PointIgal Lytzki
Behind the Attack: Paradies Clipper Malware
Paradies Clipper
2023-01-10Perception Point@0xToxin, Igal Lytzki
The Rebranded Crypter: ScrubCrypt
ScrubCrypt
2022-09-29Perception PointIgal Lytzki
Doenerium: It’s Not a Crime to Steal From Thieves
doenerium
2022-08-21Perception PointIgal Lytzki
Behind the Attack: Remcos RAT
Remcos
2022-04-07Perception PointIgal Lytzki
Revenge RAT Malware is back: From Microsoft Excel macros to Remote Access Trojan
Revenge RAT
2021-06-20Perception PointOded Kalev
Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment
2021-06-15Perception PointShai Golderman
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
QakBot