Click here to download all references as Bib-File.
2023-05-04 ⋅ SecurityScorecard ⋅ How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-02-07 ⋅ SecurityScorecard ⋅ A Detailed Analysis of a New Stealer Called Stealerium Stealerium |
2023-01-10 ⋅ SecurityScorecard ⋅ How to Analyze JavaScript Malware – A Case Study of Vjw0rm Vjw0rm |
2022-11-27 ⋅ SecurityScorecard ⋅ A Technical Analysis of Royal Ransomware Royal Ransom |
2022-10-31 ⋅ Cyber Geeks ⋅ A Technical Analysis of Pegasus for Android - Part 3 Chrysaor |
2022-09-27 ⋅ Cyber Geeks ⋅ A technical analysis of Pegasus for Android – Part 2 Chrysaor |
2022-09-27 ⋅ SecurityScorecard ⋅ A Deep Dive Into the APT28’s stealer called CredoMap CredoMap |
2022-09-22 ⋅ Cyber Geeks ⋅ A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder LockBit |
2022-09-14 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the Quantum Ransomware Mount Locker |
2022-09-06 ⋅ SecurityScorecard ⋅ TTPs Associated With a New Version of the BlackCat Ransomware BlackCat |
2022-08-15 ⋅ SecurityScorecard ⋅ A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-15 ⋅ SecurityScorecard ⋅ A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-01 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the RedLine Stealer RedLine Stealer |
2022-08-01 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the RedLine Stealer RedLine Stealer |
2022-07-26 ⋅ Cyber Geeks ⋅ How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |
2022-07-18 ⋅ SecurityScorecard ⋅ A Deep Dive Into ALPHV/BlackCat Ransomware BlackCat |
2022-06-30 ⋅ Cyber Geeks (CyberMasterV) ⋅ How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |
2022-06-13 ⋅ SecurityScorecard ⋅ A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF) REvil |
2022-05-02 ⋅ LIFARS ⋅ A Deep Dive into AvosLocker Ransomware AvosLocker |
2022-04-12 ⋅ LIFARS ⋅ A Detailed Analysis of The SunCrypt Ransomware SunCrypt |