Skip to content
Home
About Us
Authors
Contact Us
Submit News
Register
Sitemap
Twitter
Linkedin-in
Youtube
Rss
CISO Notepad Series
Cybersecurity Latest Stories & News
Cyber Security Attacks & Incidents
Vulnerabilities & Zero Days
Account Login
Home
0 – CT – SOC – CSIRT Operations – Malware & Ransomware
0 – CT – SOC – CSIRT Operations – Malware & Ransomware
FLYINGDUCK
A Case Study FlyingDuck – FAKE GITHUB RESEARCHERSARE USING POC EXPLOITSTO SPREAD MALWARE
VERSA Network
How Adopting A Zero Trust Architecture Can Help Protect Against Digital Supply Chain Management Attacks
SecurityScorecard
How to Analyze Java
Packt
Effective Threat Investigation for SOC Analysts
BRANDEFENSE
RANSOMWARE TRENDS REPORT Q2 2023 with comparison Q1 | 2023
Thecyphere
Ransomware Attack Response Checklist
Ransomware Control Matrix (RCX)2023
Malware Sandboxing (Build your own Sandbox)
CCDCOE
Malware Reverse Engineering Handbook
RUSI
Cyber Insurance and theRansomware Challenge
KnowBe4
Ransomware Hostage Rescue Manual
LUMU
2023 Ransomware Flashcard Analysis and Overview
CYBLE
Q2-2023Ransomware Report
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
KnowBe4
Ransomware Hostage Rescue Manual
Joas Antonio
Ransomware Investigation osint and hunting Overview PT1
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
ISACA
ISACA Ransomware Incident Response -23
NIST
Detecting and Responding to Ransomware
Cybersecurity and Infrastructure Security Agency
Stop Ransomware Guide May 2023
CYDERES
A Review Ransomware Intrusion
FATF
Countering Ransomware Financing – FATF Report March 2023
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
ANALYST1 - Jon DiMaggio
The Ransomware Diaries – Volume 2 – A Ransomware Hacker Origin Story by Jon DiMaggio
Bitdefender
Bitdefender-PR-Whitepaper-S1deloadStealer-creat6669-en-EN
ChatGPT
Malware Analysis By ChatGPT
HADESS
TACFAM DB-120WL
REMORA
MOVEIT ADVISORY NOTE
SecurityScorecard
How to Analyze Java Malware – A Case Study of STRRAT
Posts navigation
1
2
…
95
Latest Cyber News
securityweek.com
New ‘Turtle’ macOS Ransomware Analyzed – Source: www.securityweek.com
01/12/2023
securityweek.com
US Sanctions North Korean Cyberespionage Group Kimsuky – Source: www.securityweek.com
01/12/2023
securityweek.com
Simple Attack Allowed Extraction of ChatGPT Training Data – Source: www.securityweek.com
01/12/2023
The Hacker News
New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia – Source:thehackernews.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Mobile statistics – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution Q3 2023 – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Non-mobile statistics – Source: securelist.com
01/12/2023
The Register Security
Regulator says stranger entered hospital, treated a patient, took a document … then vanished – Source: go.theregister.com
01/12/2023
The Register Security
Interpol makes first border arrest using Biometric Hub to ID suspect – Source: go.theregister.com
01/12/2023