Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-15MicrosoftCristin Goodwin
Fighting cyberweapons built by private businesses
2021-07-15ISATom Winston
What is Cyber Threat Intelligence?
2021-07-14Intel 471Intel 471
How cybercriminals create turbulence for the transportation industry
Mount Locker Nefilim
2021-07-08MIT Technology ReviewPatrick Howell O'Neill
Inside the FBI, Russia, and Ukraine’s failed cybercrime investigation
2021-07-06CybereasonTom Fakterman
Cybereason vs. REvil Ransomware: The Kaseya Chronicles
REvil
2021-07-06FPRIJosephine Wolff
Understanding Russia’s Cyber Strategy
2021-07-06Group-IBDmitry Volkov, Stephen Kavanagh
Operation Lyrebird: Group-IB assists INTERPOL in identifying suspect behind numerous cybercrimes worldwide
2021-07-01AT&T CybersecurityFernando Martinez, Ofer Caspi
REvil’s new Linux version
REvil REvil
2021-06-29Silverado Policy AcceleratorAnne Neuberger, Dmitri Alperovitch
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger
2021-06-28Konrad Adenauer StiftungStefan Soesanto
Outward Defense: Comparing the Cyber Defense Postures of Japan, the Netherlands and the United States in Peace Time
2021-06-24BinanceBinance
Binance Helps Take Down Cybercriminal Ring Laundering $500M in Ransomware Attacks
Clop
2021-06-23Intel 471Greg Otto
Cybercriminals shop around for schemes targeting retail
2021-06-22ABC NewsThe Associated Press
Polish intelligence agencies link cyberattack to Russia (UNC1151)
2021-06-21Medium gabrielcurrieGabriel Currie
Ready for (nearly) anything: Five things to prepare for a cyber security incident
2021-06-19NATONATO Strategic CommunicationsCentre of Excellence
Russia's Strategy in Cyberspace
2021-06-18YouTube (jnpc)Twitter (@yarai1978), Yuu Arai
"Cyber ​​Security" Yu Arai, NTT DATA Executive Security Analyst
2021-06-16Національної поліції УкраїниНаціональна поліція України
Cyberpolice exposes hacker group in spreading encryption virus and causing half a billion dollars in damage to foreign companies
Clop Cobalt Strike FlawedAmmyy
2021-06-15Silent PushSilent Push
Infra-Tagging -a new tool in Cyber Threat Intelligence
2021-06-15ICRCICRC
Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide