Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-08-24Persianov on SecuritySveatoslav Persianov
Windows worms. Forbix worm analysis
forbiks
2019-04-12Stratosphere LabMaría José Erquiaga
Analysis of an IRC based Botnet
Mirai
2019-04-07Sveatoslav Persianov
Emotet malware analysis. Part 2
Emotet
2019-03-17Persianov on SecuritySveatoslav Persianov
Emotet malware analysis. Part 1
Emotet
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Decryptor Released by the Cisco Talos Group
Thanatos Ransomware
2018-02-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption
Thanatos Ransomware
2018-02-15MBSDSatoshi Sugawara, Takashi Yoshikawa
Olympic Destroyer
Olympic Destroyer
2016-03-10ProofpointProofpoint Staff
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos