Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-01-18CiscoAndrea Scarfo
Finding the RAT’s Nest
Luminosity RAT
2017-01-01Cisco TalosPaul Rascagnères, Warren Mercer
Introducing ROKRAT
RokRAT
2016-12-07Cisco TalosBen Baker, Edmund Brumaghin, Jonas Zaddach, Mariano Graziano
Floki Bot Strikes, Talos and Flashpoint Respond
FlokiBot
2016-09-29Cisco TalosEdmund Brumaghin
Want Tofsee My Pictures? A Botnet Gets Aggressive
Tofsee
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-04-28Cisco TalosBen Baker
Research Spotlight: The Resurgence of Qbot
QakBot
2016-03-23Cisco TalosCisco Talos
SamSam: The Doctor Will See You, After He Pays The Ransom
SamSam
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-03-20Cisco TalosAlain Zidouemba, Andrea Allievi, Angel Villegas, Ben Baker, Douglas Goddard, JJ Cummings, Nick Biasini, William Largent
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2014-10-28CiscoAlain Zidouemba, Andrea Allievi, Douglas Goddard, Shaun Hurley
Threat Spotlight: Group 72, Opening the ZxShell
ZXShell
2013-12-04Cisco TalosCraig Williams
The Internet of Everything, Including Malware
Zollard
2013-05-01CiscoMary Landesman
Linux/CDorked FAQs
CDorked