Behavioral task
behavioral1
Sample
Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf
Resource
win10v2004-20220901-en
General
-
Target
Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf
-
Size
9.4MB
-
MD5
e726cd783d8663b002f97e3b4b944805
-
SHA1
b39d1b8707595a89db57194a4e780b984b927496
-
SHA256
de0d13fd6865d31ff5ba229c719bd6f1998ca164cf9a98d1d6f8d0a3e819c6c3
-
SHA512
a87a258d01730596f22e5cd8d3f5e5970c64eb107658b15ef7535b7f5d00cf95d819ae2bb47acc9be0e34530f5f37ca4e1fc0bb7c313f2a212b6ca7795240fff
-
SSDEEP
98304:JejzCA18DNAfZUvzrHAAGeKxgEp81/zXUZN4T1faAOi5fsyHxb7sVgjux:c/CA2+RgrHdGhgEpW/zXUnWfRxxPV4K6
Malware Config
Signatures
Files
-
Security Incidents Response Against Cyber Attacks (Akashdeep Bhardwaj, Varun Sapra) (z-lib.org).pdf.pdf
-
http://www.springer.com/series/15427
-
https://doi.org/10.1007/978-3-030-69174-5
-
https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
-
https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
-
https://searchsecurity.techtarget.com/feature/10-types-of-security-incidents-and-how-to-handle-them
-
https://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_1&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_1#DOI
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
-
https://en.wikipedia.org/wiki/Cyber_security_standards
-
https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_2&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_2#DOI
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_3&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_3#DOI
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_4&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_4#DOI
-
http://av-test.org
-
https://doi.org/10.1109/IBIGDELFT.2018.8625275
-
https://doi.org/10.1109/ACCESS.2020.3008081
-
https://doi.org/10.1109/ICCS45141.2019.9065765
-
https://www.kaspersky.com/about/press-releases/2019_the-number-of-mobile-malware-attacks-doubles-in-2018-as-cybercriminals-sharpen-their-distribution-strategies
-
https://doi.org/10.1109/IC3.2018.8530668
-
https://doi.org/10.1109/TIFS.2018.2866319
-
https://doi.org/10.1109/CNS.2018.8433204
-
https://doi.org/10.1109/ICCNC.2018.8390391
-
https://doi.org/10.1109/BigData47090.2019.9006053
-
https://doi.org/10.1109/ICCNC.2019.8685502
-
https://doi.org/10.1109/IMCEC46724.2019.8983860
-
https://doi.org/10.1109/ICOEI.2019.8862633
-
https://doi.org/10.1109/ICECA.2019.8821811
-
https://doi.org/10.1109/TrustCom.2016.0070
-
https://doi.org/10.1109/ICACCI.2017.8126084
-
https://doi.org/10.1109/SARNOF.2016.7846747
-
https://doi.org/10.1109/ASE.2019.00155
-
https://doi.org/10.1109/TST.2016.7399288
-
https://doi.org/10.1109/CompComm.2018.8781037
-
https://doi.org/10.1109/TNSE.2020.2996379
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_5&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_5#DOI
-
https://news.bitcoin.com/beginners-guide-buying-goods-darknet/
-
https://www.brighttalk.com/webcast/10813/376953/illuminating-the-dark-web
-
http://www.objs.com/survey/WebArch.htm
-
http://www.torproject.org
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_6&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_6#DOI
-
https://doi.org/10.1016/j.procs.2016.02.112
-
https://doi.org/10.1287/serv.2016.0170
-
https://doi.org/10.1016/j.tine.2015.06.002
-
https://doi.org/10.1016/j.procs.2016.09.17
-
https://doi.org/10.17512/pjms.2017.16.1.12
-
https://doi.org/10.5267/j.ac.2015.11.004
-
https://doi.org/10.5171/2017.176215
-
https://doi.org/10.1002/cc.2012
-
https://doi.org/10.1108/BIJ-07-2018-0204
-
https://doi.org/10.1166/asl.2014.5279
-
https://doi.org/10.15341/jbe(2155-7950)/09.06.2015/010
-
https://doi.org/10.4018/irmj.2014100103
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_7&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_7#DOI
-
https://doi.org/10.1109/CLOUD.2015.46
-
https://doi.org/10.1016/j.patrec.2014.07.019
-
https://doi.org/10.1007/978-3-642-16444-6_79
-
https://doi.org/10.1016/j.procs.2015.04.245
-
https://doi.org/10.1109/ELEKTRO.2012.6225571
-
https://doi.org/10.1109/WDFIA.2007.4299371
-
https://doi.org/10.1109/ICDCSW.2014.18
-
https://www.incapsula.com/DDoS-report/DDoS-report-q1-2016.html
-
https://doi.org/10.1109/ICCCI.2012.6158817
-
https://doi.org/10.1109/ISCO.2016.7726917
-
https://doi.org/10.1109/TDSC.2014.2315198
-
https://doi.org/10.1007/978-3-642-24037-9_57
-
https://doi.org/10.5121/ijnsa.2014.6305
-
https://doi.org/10.1109/SURV.2013.031413.00127
-
https://doi.org/10.1109/TDSC.2015.2494039
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_8&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_8#DOI
-
http://www.who.int/
-
https://www.cps.gov.uk/legal-guidance/cybercrimeprosecution-guidance
-
https://www.zscaler.com/blogs/research/new-androidapp-offers-coronavirus-safety-mask-delivers-sms-trojan
-
https://www.europol.europa.eu/publicationsdocuments/pandemic-profiteering-how-criminalsexploit-covid-19-crisis
-
https://news.sophos.com/enus/2020/04/14/covidmalware
-
https://www.hiscox.co.uk/cyberreadiness
-
https://twitter.com/BigBenKoenig/status/1242503232527589376
-
https://krebsonsecurity.com/2020/03/live-coronavirusmap-used-to-spread-malware/
-
https://cloud.google.com/blog/products/identitysecurity/protecting-against-cyber-threats-during-covid19-and-beyond
-
https://blog.malwarebytes.com/socialengineering/2020/03/cybercriminals-impersonate-worldhealth-organization-to-distribute-fake-coronavirus-ebook/
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246751/horr75-chap1.pdf
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/248621/horr75-chap2.pdf
-
https://www.nhs.uk/oneyou/every-mindmatters/coronavirus-covid-19-anxiety-tips
-
https://us.norton.com/internetsecurity-online-scamscoronavirus-phishing-scams.html
-
https://www.bloomberg.com/opinion/articles/2020-05-01/coronavirus-trillions-in-aid-draws-scams-anddodgy-deals
-
https://www.birminghammail.co.uk/news/midlandsnews/school-meals-coronavirus-text-scam-17975311
-
https://doi.org/10.1109/ACCESS.2020.3022855
-
https://blog.barracuda.com/2020/03/26/threatspotlight-coronavirus-related-phishing
-
https://www.theguardian.com/world/2020/may/13/fraudsters-use-bogus-nhs-contact-tracing-app-inphishing-scam
-
https://doi.org/10.1109/ICCIKE47802.2019.9004356
-
https://www.theguardian.com/world/2020/mar/19/coronavirus-scams-phishing-fake-treatments
-
https://www.thetimes.co.uk/article/fraudstersimpersonate-airlines-and-tesco-in-coronavirus-scams5wdwhxq7p
-
https://www.journalofaccountancy.com/news/2018/sep/cyber-criminals-prey-on-natural-disaster-victims201819720.html
-
https://covid19.who.int/
-
https://www.who.int/news-room/campaigns/connectingthe-world-to-combat-coronavirus/healthyathome
-
https://www.wired.co.uk/article/coronavirus-hackerscybercrime-phishing
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_9&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_9#DOI
-
https://doi.org/10.1109/ICGS3.2019.8688031
-
https://doi.org/10.1109/COMST.2019.2891891
-
https://doi.org/10.1109/ITNEC.2019.8729178
-
https://doi.org/10.1109/ACCESS.2019.2930200
-
https://xmcyber.com/how-advanced-persistent-threats-work/
-
https://securityintelligence.com/posts/what-are-advanced-persistent-threats-apts-and-how-do-you-find-them
-
https://www.infosecurity-magazine.com/news/apt-uses-arsenal-of-tools-to-evade-1/
-
https://doi.org/10.1109/REW.2019.00032
-
https://doi.org/10.1109/TIFS.2018.2847671
-
https://doi.org/10.1109/ACCESS.2019.2932020
-
https://doi.org/10.1109/ICEIEC.2019.8784483
-
https://doi.org/10.1109/ACCESS.2019.2894509
-
https://doi.org/10.1109/SP.2019.00026
-
https://doi.org/10.23919/SOFTCOM.2019.8903788
-
https://www.meritalk.com/articles/nist-publishing-apt-cyber-resilience-guidance-in-september/
-
https://csrc.nist.gov/News/2019/nist-releases-final-public-draft-sp-800-160-vol-2
-
https://doi.org/10.1109/CSCI46756.2018.00028
-
https://doi.org/10.1109/TENCON.2019.8929620
-
https://doi.org/10.1109/TSUSC.2019.2913317
-
https://doi.org/10.1109/TDSC.2020.2971484
-
https://doi.org/10.1109/TSMC.2019.2956860
-
https://doi.org/10.1109/TIFS.2018.2885251
-
https://doi.org/10.1109/ICCT46805.2019.8947201
-
https://doi.org/10.1109/TII.2019.2925035
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_10&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_10#DOI
-
https://www.veracode.com/security/xss
-
https://www.veracode.com/security/sql-injection
-
https://www.veracode.com/security/insecure-crypto
-
https://www.esecurityplanet.com/network-security/application-firewalls.html
-
https://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet/
-
https://www.geekwire.com/2018/memcached-servers-used-launch-record-setting-ddos-attacks/
-
https://www.uniassignment.com/essay-samples/information-technology/abuse-and-nefarious-use-of-cloud-computing-information-technology-essay.php?vref=1
-
https://www.globalsign.com/en/blog/denial-of-service-in-the-iot/
-
https://www.webtitan.com
-
https://www.titanhq.com/blog/how-to-detect-and-escape-evil-twin-wi-fi-access-points/
-
https://www.alienvault.com/blogs/security-essentials/security-issues-of-wifi-how-it-works
-
https://digitalguardian.com/blog/what-cloud-account-hijacking
-
https://www.ipwatchdog.com/2016/11/28/enabling-technologies-internet-things/id=75039/
-
https://www.greycampus.com/blog/information-security/what-is-a-sniffing-attack-and-how-can-you-defend-it
-
https://www.esecurityplanet.com/views/article.php/3869221/Top-Ten-WiFi-Security-Threats.htm
-
https://portswigger.net/web-security/cross-site-scripting
-
https://www.esecurityplanet.com/network-security/how-to-prevent-ddos-attacks.html
-
https://www.cl.cam.ac.uk/~sps32/semi-inv_def.html
-
https://blog.atlasrfidstore.com/7-types-security-attacks-rfid-systems
-
https://www.metacompliance.com/blog/10-biggest-ddos-attacks-and-how-your-organisation-can-learn-from-them/
-
https://www.infosec.gov.hk/english/technical/files/rfid.pdf
-
https://en.wikipedia.org/wiki/Advanced_persistent_threat
-
http://crossmark.crossref.org/dialog/?doi=10.1007/978-3-030-69174-5_11&domain=pdf
-
https://doi.org/10.1007/978-3-030-69174-5_11#DOI
-
https://doi.org/10.1007/978-3-030-69174-5#DOI
-
https://doi.org/10.1007/978-3-030-69174-5�
-
https://www.accenture.com/us-����
-
https://cybersecurityventures.com/hackerpocalypse-����
-
https://searchsecurity.techtarget.com/feature/10-����
-
https://whatis.techtarget.com/denition/CERT-����
-
https://doi.org/10.1007/978-3-030-69174-5_1Chapter
-
http://Opensecurityalliance.org
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-����
-
https://en.wikipedia.org/wiki/Cyber_security_standardsEquifax
-
https://www.csoonline.com/article/3444488/equifax-����
-
https://doi.org/10.1007/978-3-030-69174-5_2Chapter
-
http://PDFS.no
-
http://ReferenceS.no
-
https://doi.org/10.1007/978-3-030-69174-5_3Chapter
-
http://velsuniv.ac.in
-
https://doi.org/10.1007/978-3-030-69174-5_4Chapter
-
http://mu.edu.sa
-
http://test.org
-
https://doi.org/10.1109/IBIGDELFT.2018.8625275G.Conti,
-
https://doi.org/10.1109/ACCESS.2020.3008081K.He,
-
https://doi.org/10.1109/ICCS45141.2019.9065765N.Idika,
-
https://www.kaspersky.com/about/press-����
-
https://doi.org/10.1109/IC3.2018.8530668T.Kim,
-
https://doi.org/10.1109/TIFS.2018.2866319B.Kolosnjaji,
-
https://doi.org/10.1109/CNS.2018.8433204W.Li,
-
https://doi.org/10.1109/ICCNC.2018.8390391M.Masum,
-
https://doi.org/10.1109/BigData47090.2019.9006053J.McGiff,
-
https://doi.org/10.1109/IMCEC46724.2019.8983860H.Naeem,
-
https://doi.org/10.1109/ICOEI.2019.8862633M.Shaha,
-
https://doi.org/10.1109/ICECA.2019.8821811X.Su,
-
https://doi.org/10.1109/TrustCom.2016.0070G.Sun,
-
https://doi.org/10.1109/ICACCI.2017.8126084Z.Wang,
-
https://doi.org/10.1109/SARNOF.2016.7846747K.Weiss,
-
https://doi.org/10.1109/ASE.2019.00155Z.Yuan,
-
https://doi.org/10.1109/TST.2016.73992884��
-
https://doi.org/10.1109/CompComm.2018.8781037Y.-l.
-
https://doi.org/10.1007/978-3-030-69174-5_5Chapter
-
https://news.bitcoin.com/beginners-����
-
https://www.brighttalk.com/webcast/10813/376953/illuminating-����
-
http://www.objs.com/survey/WebArch.htmM.F.B.Rauddin,
-
https://doi.org/10.1007/978-3-030-69174-5_6Chapter
-
https://doi.org/10.1016/j.procs.2016.02.112S.Chung,
-
https://doi.org/10.1287/serv.2016.0170J.E.Hoch,
-
https://doi.org/10.1016/j.tine.2015.06.0026��
-
https://doi.org/10.1016/j.procs.2016.09.17M.Kennerley,
-
https://doi.org/10.17512/pjms.2017.16.1.12S.Orougi,
-
https://doi.org/10.5267/j.ac.2015.11.004S.Parthasarathy,
-
https://doi.org/10.5171/2017.176215R.Petrasch,
-
https://doi.org/10.1002/cc.2012V.Shivajee,
-
https://doi.org/10.1108/BIJ-����
-
https://doi.org/10.1166/asl.2014.5279E.Turban,
-
https://doi.org/10.15341/jbe
-
https://doi.org/10.1007/978-3-030-69174-5_7Chapter
-
https://doi.org/10.1109/CLOUD.2015.46S.Arukonda,
-
https://doi.org/10.1016/j.patrec.2014.07.019H.Choi,
-
https://doi.org/10.1007/978-����
-
https://doi.org/10.1016/j.procs.2015.04.245V.Durcekova,
-
https://doi.org/10.1109/ELEKTRO.2012.6225571K.Georgios,
-
https://doi.org/10.1109/WDFIA.2007.4299371T.Hildmann,
-
https://doi.org/10.1109/ICDCSW.2014.18Imperva,
-
https://www.incapsula.com/DDoS-����
-
https://doi.org/10.1109/ICCCI.2012.6158817A.Khadke,
-
https://doi.org/10.1109/ISCO.2016.7726917A.Malik,
-
https://doi.org/10.1109/TDSC.2014.2315198A.Mishra,
-
https://doi.org/10.1109/SURV.2013.031413.00127P.Zilberman,
-
https://doi.org/10.1109/TDSC.2015.24940397��
-
https://doi.org/10.1007/978-3-030-69174-5_8Chapter
-
http://who.org
-
http://www.who.int
-
https://www.cps.gov.uk/legal-����
-
https://www.zscaler.com/blogs/research/new-����
-
https://www.europol.europa.eu/publicationsdocuments/pandemic-����
-
https://news.sophos.com/enus/2020/04/14/covidmalware.
-
https://www.hiscox.co.uk/cyberreadiness.
-
https://twitter.com/BigBenKoenig/sta-tus/1242503232527589376.
-
https://krebsonsecu-rity.com/2020/03/live-����
-
https://cloud.google.com/blog/products/identitysecurity/protecting-����
-
https://blog.malwarebytes.com/socialengineering/2020/03/cybercriminals-����
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/le/246751/horr75-����
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/le/248621/horr75-����
-
https://www.nhs.uk/oneyou/every-����
-
https://us.norton.com/internetsecurity-����
-
https://www.bloomberg.com/opinion/articles/2020-����
-
https://www.birminghammail.co.uk/news/midlandsnews/school-����
-
https://doi.org/10.1109/ACCESS.2020.3022855F.Shi,
-
https://blog.barracuda.com/2020/03/26/threatspotlight-����
-
https://www.theguardian.com/world/2020/may/13/fraudsters-����
-
https://doi.org/10.1109/ICCIKE47802.2019.9004356The
-
https://www.theguardian.com/world/2020/mar/19/coronavirus-����
-
https://www.thetimes.co.uk/article/fraudstersimpersonate-����
-
https://www.journalofac-countancy.com/news/2018/sep/cyber-����
-
https://covid19.who.int/.
-
https://www.who.int/news-����
-
https://www.wired.co.uk/article/coronavirus-����
-
https://doi.org/10.1007/978-3-030-69174-5_9Chapter
-
https://doi.org/10.1109/ICGS3.2019.8688031A.Alshamrani,
-
https://doi.org/10.1109/COMST.2019.2891891S.Chandel,
-
https://doi.org/10.1109/ITNEC.2019.8729178I.Ghar,
-
https://doi.org/10.1109/ACCESS.2019.29302009��
-
https://xmcyber.com/how-����
-
https://securityintelligence.com/posts/what-����
-
http://magazine.com/news/apt-����
-
https://doi.org/10.1109/REW.2019.00032Y.Kim,
-
https://doi.org/10.1109/TIFS.2018.2847671P.Li,
-
https://doi.org/10.1109/ACCESS.2019.2932020D.Liu,
-
https://doi.org/10.1109/ICEIEC.2019.8784483Z.Ma,
-
https://doi.org/10.1109/ACCESS.2019.2894509S.Milajerdi,
-
https://doi.org/10.1109/SP.2019.00026M.Nicho,
-
https://doi.org/10.23919/SOFTCOM.2019.8903788NIST
-
https://www.meritalk.com/articles/nist-����
-
https://csrc.nist.gov/News/2019/nist-����
-
https://doi.org/10.1109/CSCI46756.2018.00028K.Radhakrishnan,
-
https://doi.org/10.1109/TENCON.2019.8929620J.Wu,
-
https://doi.org/10.1109/TSUSC.2019.2913317C.Xiong,
-
https://doi.org/10.1109/TDSC.2020.2971484L.Yang,
-
https://doi.org/10.1109/TSMC.2019.2956860L.Yang,
-
https://doi.org/10.1109/ICCT46805.2019.8947201H.Yuan,
-
https://doi.org/10.1109/TII.2019.29250359��
-
https://doi.org/10.1007/978-3-030-69174-5_10Chapter
-
https://www.uniassignment.com/essay-����
-
https://www.globalsign.com/en/blog/denial-����
-
https://www.titanhq.com/blog/how-����
-
https://www.alienvault.com/blogs/security-����
-
https://digitalguardian.com/blog/what-����
-
https://www.ipwatchdog.com/2016/11/28/enabling-����
-
https://www.greycampus.com/blog/information-����
-
https://www.esecurityplanet.com/views/article.php/3869221/Top-����
-
https://portswigger.net/web-����
-
https://www.esecurityplanet.com/network-����
-
https://www.cl.cam.ac.uk/~sps32/semi-����
-
http://dstore.com/7-
-
https://www.metacompliance.com/blog/10-biggest-ddos-attacks-and-how-your-organisation-
-
https://www.infosec.gov.hk/english/technical/les/rd.pdfWikipedia:
-
https://en.wikipedia.org/wiki/Advanced_persistent_
-
https://doi.org/10.1007/978-3-030-69174-5_11Chapter
- Show all
-