General

  • Target

    Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf

  • Size

    9.4MB

  • MD5

    e726cd783d8663b002f97e3b4b944805

  • SHA1

    b39d1b8707595a89db57194a4e780b984b927496

  • SHA256

    de0d13fd6865d31ff5ba229c719bd6f1998ca164cf9a98d1d6f8d0a3e819c6c3

  • SHA512

    a87a258d01730596f22e5cd8d3f5e5970c64eb107658b15ef7535b7f5d00cf95d819ae2bb47acc9be0e34530f5f37ca4e1fc0bb7c313f2a212b6ca7795240fff

  • SSDEEP

    98304:JejzCA18DNAfZUvzrHAAGeKxgEp81/zXUZN4T1faAOi5fsyHxb7sVgjux:c/CA2+RgrHdGhgEpW/zXUnWfRxxPV4K6

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf
    .pdf
    • http://www.springer.com/series/15427

    • https://doi.org/10.1007/978-3-030-69174-5

    • https://www.accenture.com/us-en/insights/security/cost-cybercrime-study

    • https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

    • https://searchsecurity.techtarget.com/feature/10-types-of-security-incidents-and-how-to-handle-them

    • https://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team

    • http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_1&domain=pdf

    • https://doi.org/10.1007/978-3-030-69174-5_1#DOI

    • https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

    • Show all