Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-10-22CiscoPaul Rascagnères, Vitor Ventura, Warren Mercer
“Cyber Conflict” Decoy Document Used In Real Cyber Conflict
Seduploader
2017-09-20Cisco TalosCraig Williams, Earl Carter, Edmund Brumaghin, Matthew Molyett, Matthew Olney, Paul Rascagnères, Warren Mercer
CCleaner Command and Control Causes Concern
CCleaner Backdoor
2017-07-06Cisco TalosPaul Rascagnères
New KONNI Campaign References North Korean Missile Capabilities
Konni
2017-06-19Cisco TalosEmmanuel Tacheau, Martin Lee, Paul Rascagnères, Vanja Svajcer, Warren Mercer
Delphi Used To Score Against Palestine
The Big Bang
2017-06-19Cisco TalosEmmanuel Tacheau, Martin Lee, Paul Rascagnères, Vanja Svajcer, Warren Mercer
Delphi Used To Score Against Palestine
Micropsia AridViper
2017-05-03Cisco TalosPaul Rascagnères
KONNI: A Malware Under The Radar For Years
Konni
2017-04-03Cisco TalosMatthew Molyett, Paul Rascagnères, Warren Mercer
Introducing ROKRAT
RokRAT
2017-02-23Cisco TalosPaul Rascagnères, Warren Mercer
Korean MalDoc Drops Evil New Years Presents
Unidentified 013 (Korean)
2017-01-30CiscoMariano Graziano, Paul Rascagnères
EyePyramid: An Archaeological Journey
Eye Pyramid
2017-01-01Cisco TalosPaul Rascagnères, Warren Mercer
Introducing ROKRAT
RokRAT
2016-10-27SekoiaPaul Rascagnères
Rootkit analysisUse case on HideDRV
HideDRV
2013-03-27Malware.luPaul Rascagnères
APT1: technical backstage
Terminator RAT