Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-10SecurityScorecardVlad Pasca
@online{pasca:20230110:how:f3b9788, author = {Vlad Pasca}, title = {{How to Analyze JavaScript Malware – A Case Study of Vjw0rm}}, date = {2023-01-10}, organization = {SecurityScorecard}, url = {https://resources.securityscorecard.com/research/acasestudyofVjw0rm#page=1}, language = {English}, urldate = {2023-01-18} } How to Analyze JavaScript Malware – A Case Study of Vjw0rm
Vjw0rm
2022-11-27SecurityScorecardVlad Pasca
@online{pasca:20221127:technical:c2326cf, author = {Vlad Pasca}, title = {{A Technical Analysis of Royal Ransomware}}, date = {2022-11-27}, organization = {SecurityScorecard}, url = {https://securityscorecard.pathfactory.com/research/the-royal-ransomware}, language = {English}, urldate = {2022-11-28} } A Technical Analysis of Royal Ransomware
Royal Ransom
2022-10-31Cyber GeeksVlad Pasca
@online{pasca:20221031:technical:d4f90e3, author = {Vlad Pasca}, title = {{A Technical Analysis of Pegasus for Android - Part 3}}, date = {2022-10-31}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/}, language = {English}, urldate = {2022-11-01} } A Technical Analysis of Pegasus for Android - Part 3
Chrysaor
2022-09-27Cyber GeeksVlad Pasca
@online{pasca:20220927:technical:3b1f571, author = {Vlad Pasca}, title = {{A technical analysis of Pegasus for Android – Part 2}}, date = {2022-09-27}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/}, language = {English}, urldate = {2022-09-29} } A technical analysis of Pegasus for Android – Part 2
Chrysaor
2022-09-27SecurityScorecardVlad Pasca
@online{pasca:20220927:deep:203b1f0, author = {Vlad Pasca}, title = {{A Deep Dive Into the APT28’s stealer called CredoMap}}, date = {2022-09-27}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/research/apt28s-stealer-called-credomap}, language = {English}, urldate = {2022-09-29} } A Deep Dive Into the APT28’s stealer called CredoMap
CredoMap
2022-09-22Cyber GeeksVlad Pasca
@online{pasca:20220922:technical:96bb05e, author = {Vlad Pasca}, title = {{A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder}}, date = {2022-09-22}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-the-leaked-lockbit-3-0-builder/}, language = {English}, urldate = {2022-09-26} } A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder
LockBit
2022-09-14SecurityScorecardVlad Pasca
@online{pasca:20220914:detailed:f0a7a7f, author = {Vlad Pasca}, title = {{A Detailed Analysis of the Quantum Ransomware}}, date = {2022-09-14}, organization = {SecurityScorecard}, url = {https://securityscorecard.pathfactory.com/research/quantum-ransomware}, language = {English}, urldate = {2022-09-15} } A Detailed Analysis of the Quantum Ransomware
Mount Locker
2022-09-06SecurityScorecardVlad Pasca
@online{pasca:20220906:ttps:e1c70ed, author = {Vlad Pasca}, title = {{TTPs Associated With a New Version of the BlackCat Ransomware}}, date = {2022-09-06}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/blog/ttps-associated-with-new-version-of-blackcat-ransomware}, language = {English}, urldate = {2022-09-10} } TTPs Associated With a New Version of the BlackCat Ransomware
BlackCat
2022-08-15SecurityScorecardVlad Pasca
@online{pasca:20220815:deep:5f7d67c, author = {Vlad Pasca}, title = {{A Deep Dive Into Black Basta Ransomware}}, date = {2022-08-15}, organization = {SecurityScorecard}, url = {https://securityscorecard.pathfactory.com/all/a-deep-dive-into-bla}, language = {English}, urldate = {2022-08-17} } A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-15SecurityScorecardVlad Pasca
@online{pasca:20220815:deep:f0ad4f2, author = {Vlad Pasca}, title = {{A Deep Dive Into Black Basta Ransomware}}, date = {2022-08-15}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/research/a-deep-dive-into-black-basta-ransomware}, language = {English}, urldate = {2022-08-17} } A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-01SecurityScorecardVlad Pasca
@online{pasca:20220801:detailed:769e20c, author = {Vlad Pasca}, title = {{A Detailed Analysis of the RedLine Stealer}}, date = {2022-08-01}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/research/detailed-analysis-redline-stealer}, language = {English}, urldate = {2022-08-02} } A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-08-01SecurityScorecardVlad Pasca
@online{pasca:20220801:detailed:d5d5235, author = {Vlad Pasca}, title = {{A Detailed Analysis of the RedLine Stealer}}, date = {2022-08-01}, organization = {SecurityScorecard}, url = {https://securityscorecard.pathfactory.com/all/a-detailed-analysis}, language = {English}, urldate = {2022-08-02} } A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-07-26Cyber GeeksVlad Pasca
@online{pasca:20220726:how:f891a3c, author = {Vlad Pasca}, title = {{How To Analyze Linux Malware – A Case Study Of Symbiote}}, date = {2022-07-26}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/}, language = {English}, urldate = {2022-07-28} } How To Analyze Linux Malware – A Case Study Of Symbiote
Symbiote
2022-07-18SecurityScorecardVlad Pasca
@online{pasca:20220718:deep:86577a8, author = {Vlad Pasca}, title = {{A Deep Dive Into ALPHV/BlackCat Ransomware}}, date = {2022-07-18}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/research/deep-dive-into-alphv-blackcat-ransomware}, language = {English}, urldate = {2022-07-19} } A Deep Dive Into ALPHV/BlackCat Ransomware
BlackCat
2022-06-30Cyber Geeks (CyberMasterV)Vlad Pasca
@online{pasca:20220630:how:78e5c24, author = {Vlad Pasca}, title = {{How to Expose a Potential Cybercriminal due to Misconfigurations}}, date = {2022-06-30}, organization = {Cyber Geeks (CyberMasterV)}, url = {https://cybergeeks.tech/how-to-expose-a-potential-cybercriminal-due-to-misconfigurations/}, language = {English}, urldate = {2022-07-05} } How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-13SecurityScorecardVlad Pasca
@online{pasca:20220613:detailed:f49a7e1, author = {Vlad Pasca}, title = {{A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF)}}, date = {2022-06-13}, organization = {SecurityScorecard}, url = {https://securityscorecard.com/research/a-detailed-analysis-of-the-last-version-of-revil-ransomware}, language = {English}, urldate = {2022-06-15} } A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF)
REvil
2022-05-02LIFARSVlad Pasca
@techreport{pasca:20220502:deep:e3a4dd8, author = {Vlad Pasca}, title = {{A Deep Dive into AvosLocker Ransomware}}, date = {2022-05-02}, institution = {LIFARS}, url = {https://cdn.pathfactory.com/assets/10555/contents/400686/13f4424c-05b4-46db-bb9c-6bf9b5436ec4.pdf}, language = {English}, urldate = {2022-05-08} } A Deep Dive into AvosLocker Ransomware
AvosLocker
2022-04-12LIFARSVlad Pasca
@techreport{pasca:20220412:detailed:132144b, author = {Vlad Pasca}, title = {{A Detailed Analysis of The SunCrypt Ransomware}}, date = {2022-04-12}, institution = {LIFARS}, url = {https://cdn.pathfactory.com/assets/10555/contents/394789/0dd521f8-aa64-4517-834e-bc852e9ab95d.pdf}, language = {English}, urldate = {2022-04-24} } A Detailed Analysis of The SunCrypt Ransomware
SunCrypt
2022-03-28Cyber Geeks (CyberMasterV)Vlad Pasca
@online{pasca:20220328:stepbystep:7d92613, author = {Vlad Pasca}, title = {{A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla}}, date = {2022-03-28}, organization = {Cyber Geeks (CyberMasterV)}, url = {https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/}, language = {English}, urldate = {2022-03-29} } A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla
TinyTurla
2022-02-28Cyber GeeksVlad Pasca
@online{pasca:20220228:how:0e715ab, author = {Vlad Pasca}, title = {{How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization}}, date = {2022-02-28}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/how-to-analyze-malicious-documents-case-study-of-an-attack-targeting-ukraine-organizations/}, language = {English}, urldate = {2022-03-07} } How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization