Click here to download all references as Bib-File.
2023-09-27 ⋅ Cyber Geeks ⋅ A Deep Dive into Brute Ratel C4 payloads – Part 2 Brute Ratel C4 |
2023-09-13 ⋅ SecurityScorecard ⋅ A detailed analysis of the Money Message Ransomware Money Message |
2023-07-17 ⋅ SecurityScorecard ⋅ A technical analysis of the Quasar-forked RAT called VoidRAT VoidRAT |
2023-05-04 ⋅ SecurityScorecard ⋅ How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-02-07 ⋅ SecurityScorecard ⋅ A Detailed Analysis of a New Stealer Called Stealerium Stealerium |
2023-01-10 ⋅ SecurityScorecard ⋅ How to Analyze JavaScript Malware – A Case Study of Vjw0rm Vjw0rm |
2022-11-27 ⋅ SecurityScorecard ⋅ A Technical Analysis of Royal Ransomware Royal Ransom |
2022-10-31 ⋅ Cyber Geeks ⋅ A Technical Analysis of Pegasus for Android - Part 3 Chrysaor |
2022-09-27 ⋅ Cyber Geeks ⋅ A technical analysis of Pegasus for Android – Part 2 Chrysaor |
2022-09-27 ⋅ SecurityScorecard ⋅ A Deep Dive Into the APT28’s stealer called CredoMap CredoMap |
2022-09-22 ⋅ Cyber Geeks ⋅ A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder LockBit |
2022-09-14 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the Quantum Ransomware Mount Locker |
2022-09-06 ⋅ SecurityScorecard ⋅ TTPs Associated With a New Version of the BlackCat Ransomware BlackCat |
2022-08-15 ⋅ SecurityScorecard ⋅ A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-15 ⋅ SecurityScorecard ⋅ A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-01 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the RedLine Stealer RedLine Stealer |
2022-08-01 ⋅ SecurityScorecard ⋅ A Detailed Analysis of the RedLine Stealer RedLine Stealer |
2022-07-26 ⋅ Cyber Geeks ⋅ How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |
2022-07-18 ⋅ SecurityScorecard ⋅ A Deep Dive Into ALPHV/BlackCat Ransomware BlackCat |
2022-06-30 ⋅ Cyber Geeks (CyberMasterV) ⋅ How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |