1. 2014. Target Data Breach. http://www.ibtimes.com/timeline-targets-data-breach-aftermath-how-cybertheft-snowballed-giant-retailer-1580056 http://www.ibtimes.com/timeline-targets-data-breach-aftermath-how-cybertheft-snowballed-giant-retailer-1580056. 2014. Target Data Breach. http://www.ibtimes.com/timeline-targets-data-breach-aftermath-how-cybertheft-snowballed-giant-retailer-1580056 http://www.ibtimes.com/timeline-targets-data-breach-aftermath-how-cybertheft-snowballed-giant-retailer-1580056.
2. 2017. LibVMI Events Unable to Initialize - Google Groups. https://groups.google.com/forum/#!topic/vmitools/DKzoWeLGx1c https://groups.google.com/forum/#!topic/vmitools/DKzoWeLGx1c. 2017. LibVMI Events Unable to Initialize - Google Groups. https://groups.google.com/forum/#!topic/vmitools/DKzoWeLGx1c https://groups.google.com/forum/#!topic/vmitools/DKzoWeLGx1c.
3. 2018. McAfee - View Recent Malware. https://www.mcafee.com/threat-intelligence/malware/latest.aspx https://www.mcafee.com/threat-intelligence/malware/latest.aspx. 2018. McAfee - View Recent Malware. https://www.mcafee.com/threat-intelligence/malware/latest.aspx https://www.mcafee.com/threat-intelligence/malware/latest.aspx.
4. 2018. The Volatility Foundation - Open Source Memory Forensics. http://www.volatilityfoundation.org http://www.volatilityfoundation.org. 2018. The Volatility Foundation - Open Source Memory Forensics. http://www.volatilityfoundation.org http://www.volatilityfoundation.org.
5. Security in the cloud