Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-23QualysSuraj Mundalik
Unveiling the Deceptive Dance: Phobos Ransomware Masquerading As VX-Underground
Phobos
2023-01-03QualysAkshat Pradhan
BitRAT Now Sharing Sensitive Bank Data as a Lure
BitRAT
2022-08-16QualysPawan Kumar N
AsyncRAT C2 Framework: Overview, Technical Analysis & Detection
AsyncRAT
2022-08-01QualysHarshal Tupsamudre
Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor
BPFDoor
2022-07-29QualysViren Chaudhari
New Qualys Research Report: Evolution of Quasar RAT
Quasar RAT
2022-07-27QualysViren Chaudhari
Stealthy Quasar Evolving to Lead the RAT Race
Quasar RAT
2022-06-15QualysAkshat Pradhan
Fake Cracked Software Caught Peddling Redline Stealers
RedLine Stealer
2022-05-08QualysAmit Gadhave
Ursnif Malware Banks on News Events for Phishing Attacks
ISFB
2022-03-06QualysGhanshyam More
AvosLocker Ransomware Behavior Examined on Windows & Linux
Avoslocker AvosLocker
2022-03-01QualysMayuresh Dani
Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware
HermeticWiper
2022-02-08QualysAkshat Pradhan
LolZarus: Lazarus Group Incorporating Lolbins into Campaigns
2022-02-02QualysGhanshyam More
Catching the RAT called Agent Tesla
Agent Tesla
2022-01-17QualysBajrang Mane
The Chaos Ransomware Can Be Ravaging
Chaos
2021-11-18QualysGhanshyam More
Conti Ransomware
Conti
2021-05-12QualysBajrang Mane
Nefilim Ransomware
Nefilim