Click here to download all references as Bib-File.•
| 2025-06-16
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Checking all the Boxes: LapDogs, The New ORB in Town ShortLeash ShortLeash  | 
| 2025-02-24
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Massive Botnet Targets M365 with Stealthy Password Spraying Attacks  | 
| 2025-01-29
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign BeaverTail InvisibleFerret  | 
| 2025-01-27
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign  | 
| 2024-11-12
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat  | 
| 2024-10-29
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             The Job Offer That Wasn’t: How We Stopped an Espionage Plot BeaverTail InvisibleFerret  | 
| 2024-01-14
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Operation 99: North Korean State Sponsored Supply Chain Attack on Tech Innovation  | 
| 2024-01-11
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days  | 
| 2024-01-10
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days KV  | 
| 2023-09-13
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A detailed analysis of the Money Message Ransomware Money Message  | 
| 2023-07-17
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A technical analysis of the Quasar-forked RAT called VoidRAT VoidRAT  | 
| 2023-05-04
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             How to Analyze Java Malware – A Case Study of STRRAT STRRAT  | 
| 2023-02-07
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A Detailed Analysis of a New Stealer Called Stealerium Stealerium  | 
| 2023-01-10
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             How to Analyze JavaScript Malware – A Case Study of Vjw0rm Vjw0rm  | 
| 2022-11-27
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A Technical Analysis of Royal Ransomware Royal Ransom  | 
| 2022-10-17
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices Bashlite  | 
| 2022-09-27
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A Deep Dive Into the APT28’s stealer called CredoMap CredoMap  | 
| 2022-09-14
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             A Detailed Analysis of the Quantum Ransomware Mount Locker  | 
| 2022-09-06
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             TTPs Associated With a New Version of the BlackCat Ransomware BlackCat  | 
| 2022-08-31
            
            ⋅
            
            SecurityScorecard
            ⋅
            
             Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies  |