Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-02TalosEdmund Brumaghin, Earl Carter, Emmanuel Tacheau
@online{brumaghin:20171102:poisoning:c00599d, author = {Edmund Brumaghin and Earl Carter and Emmanuel Tacheau}, title = {{Poisoning the Well: Banking Trojan Targets Google Search Results}}, date = {2017-11-02}, organization = {Talos}, url = {http://blog.talosintelligence.com/2017/11/zeus-panda-campaign.html}, language = {English}, urldate = {2019-11-21} } Poisoning the Well: Banking Trojan Targets Google Search Results
PandaBanker
2017-06-19Cisco TalosPaul Rascagnères, Warren Mercer, Emmanuel Tacheau, Vanja Svajcer, Martin Lee
@online{rascagnres:20170619:delphi:fdf6859, author = {Paul Rascagnères and Warren Mercer and Emmanuel Tacheau and Vanja Svajcer and Martin Lee}, title = {{Delphi Used To Score Against Palestine}}, date = {2017-06-19}, organization = {Cisco Talos}, url = {http://blog.talosintelligence.com/2017/06/palestine-delphi.html}, language = {English}, urldate = {2019-07-27} } Delphi Used To Score Against Palestine
Micropsia AridViper
2017-06-19Cisco TalosPaul Rascagnères, Warren Mercer, Emmanuel Tacheau, Vanja Svajcer, Martin Lee
@online{rascagnres:20170619:delphi:97e7482, author = {Paul Rascagnères and Warren Mercer and Emmanuel Tacheau and Vanja Svajcer and Martin Lee}, title = {{Delphi Used To Score Against Palestine}}, date = {2017-06-19}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2017/06/palestine-delphi.html}, language = {English}, urldate = {2020-01-06} } Delphi Used To Score Against Palestine
The Big Bang
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
@online{allievi:20150427:threat:3754b13, author = {Andrea Allievi and Earl Carter and Emmanuel Tacheau}, title = {{Threat Spotlight: TeslaCrypt – Decrypt It Yourself}}, date = {2015-04-27}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/talos/teslacrypt}, language = {English}, urldate = {2019-10-15} } Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt