Click here to download all references as Bib-File.•
| 2017-01-30
⋅
Cisco
⋅
EyePyramid: An Archaeological Journey Eye Pyramid |
| 2017-01-18
⋅
Cisco
⋅
Finding the RAT’s Nest Luminosity RAT |
| 2017-01-01
⋅
Cisco Talos
⋅
Introducing ROKRAT RokRAT |
| 2016-12-07
⋅
Cisco Talos
⋅
Floki Bot Strikes, Talos and Flashpoint Respond FlokiBot |
| 2016-09-29
⋅
Cisco Talos
⋅
Want Tofsee My Pictures? A Botnet Gets Aggressive Tofsee |
| 2016-09-13
⋅
Cisco
⋅
H1N1: Technical analysis reveals new capabilities H1N1 Loader |
| 2016-04-28
⋅
Cisco Talos
⋅
Research Spotlight: The Resurgence of Qbot QakBot |
| 2016-03-23
⋅
Cisco Talos
⋅
SamSam: The Doctor Will See You, After He Pays The Ransom SamSam |
| 2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
| 2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
| 2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
| 2014-10-28
⋅
Cisco
⋅
Threat Spotlight: Group 72, Opening the ZxShell ZXShell |
| 2013-12-04
⋅
Cisco Talos
⋅
The Internet of Everything, Including Malware Zollard |
| 2013-05-01
⋅
Cisco
⋅
Linux/CDorked FAQs CDorked |