Behavioral task
behavioral1
Sample
sensors-21-04759-v2.pdf
Resource
win10v2004-20220812-en
General
-
Target
sensors-21-04759-v2.pdf
-
Size
405KB
-
MD5
e72f5ec0c126c5cd3d8853d7deba3866
-
SHA1
a66959b963c271ca3438dc516e0766317be1811c
-
SHA256
196b299b93378538f194bacb156ee88972acdd1aebe70c0920d59908be3648be
-
SHA512
5418e6e76ebe7e08f17f954b83dd305a31289274c50788ae99e885409facb95a33c9c0e0c7c24d6c26d9eedb04fece92b69da2e3fe79966d78cf0765a6f1a608
-
SSDEEP
12288:fNqclG2ERBuoqFK2y5eQIeoWMx4JyGt+K:fxlG7BDqFWeQBys
Malware Config
Signatures
Files
-
sensors-21-04759-v2.pdf.pdf
-
https://www.mdpi.com/journal/sensors
-
https://www.mdpi.com
-
https://orcid.org/0000-0003-2036-981X
-
https://doi.org/10.3390/s21144759
-
https://creativecommons.org/
-
https://creativecommons.org/licenses/by/4.0/
-
http://searchsecurity.techtarget.com/
-
http://www.infotech.com/
-
https://www.nokia.com/networks/solutions/netguard-adaptive-security-operations/
-
https://www.splunk.com/en_us/solutions/solution-areas/security-and-fraud/adaptive-response-initiative.html
-
https://www.iacdautomate.org/
-
https://logrhythm.com/products/features/ai-engine/
-
https://www.midlandinfosys.com/ibm-power/all-categories/ai-security-siem-qradar-uba.html
-
https://www.fortinet.com/resources/cyberglossary/critical-infrastructure-protection
-
https://www.waterisac.org/system/files/articles/15%20Cybersecurity%20 Fundamentals%20%28WaterISAC%29.pdf
-
https://cyberx-labs.com/resources/nist-recommendations-for-iot-ics-security/
-
http://doi.org/10.1016/j.cose.2020.101817
-
http://docplayer.net/2407833-Magic-quadrant-for-security-information-and-event-management.html
-
https://www.novell.com/docrep/documents/yuufbom4u2/gartner_magic_ quadrant_siem_report_may2011.pdf
-
https://www.bankinfosecurity.com/whitepapers/2012-gartner-magic-quadrant-for-siem-w-602
-
https://www.gartner.com/en/documents/2477018/magic-quadrant-for-security-information-and-event-manage
-
https://www.bwdigitronik.ch/application/files/ 5814/5450/7565/www.gartner.com.com.pdf
-
https://www.gartner.com/en/documents/3097022/magic-quadrant-for-security-information-and-event-manage
-
https://securelink.net/wp-content/uploads/sites/7/2016-Magic-Quadrant-for-SIEM.pdf
-
https://www.gartner.com/en/documents/3834683/magic-quadrant-for-security-information-and-event-manage
-
https://virtualizationandstorage.files.wordpress.com/2018/03/magic-quadrant-for-security-information-and-event-3-dec-2018.pdf
-
https://www.gartner.com/en/documents/3981040/magic-quadrant-for-security-information-and-event-manage
-
http://searchsecurity.techtarget.com/feature/Comparing-the-best-SIEM-systems-on-the-market
-
http://infosecnirvana.com/siem-product-comparison-201/
-
https://www.gartner.com/en
-
https://solutionsreview.com/security-information-event-management/security-information-event-management-vendor-map/
-
http://www.locuz.com/in/wp-content/uploads/2018/01/7-siem-trends-to-watch-in-2019.pdf
-
https://searchsecurity.techtarget.com/feature/Hewlett-Packard-Enterprises-ArcSight-ESM-SIEM-product-overview
-
https://www.rsa.com/en-us/products/threat-detection-response/siem-security-information-event-management
-
https://www.prnewswire.com/news-releases/sensage-continues-success-solving-big-siem-challenges-123216948.html
-
https://enlyft.com/tech/products/symantec-security-information-manager
-
https://www.tibco.com/resources/whitepaper/augment-your-siem-deployment-tibco-loglogic
-
https://www-03.ibm.com/press/us/en/pressrelease/35544.wss
-
http://www.ingrammicro.com/healthcare/Novell_Sentinel_Log_Manager_Secure.pdf
-
https://www.ibm.com/downloads/cas/RLXJNX2G
-
https://www.quest.com/whitepaper/siem-integration-best-practices8139415/
-
https://ftpdocs.broadcom.com/cadocs/0/CA%20Enterprise%20Log %20Manager%20r12%201%20SP3-ENU/Bookshelf_Files/PDF/CAELM _Admin_ENU.pdf
-
https://fr.tenable.com/press-releases/tenable-network-security-reveals-the-next-generation-of-its-siem-solution?tns_redirect=true
-
https://www.netsurion.com/news/prism-microsystems-unveils-the-latest-version-of-its-siem-solution-eventtracker-v7-2
-
http://logmatrix.com/nervecenter-unique-automation-analysis-and-correlation-applications/
-
https://www.microfocus.com/en-us/products/netiq-sentinel/overview
-
https://www.mcafee.com/enterprise/en-us/products/siem-products.html
-
https://trustwave.azureedge.net/media/13581/tw-siem-enterprise.pdf?rnd=131659475410000000
-
https://logrhythm.com/solutions/security/siem/
-
https://www.scmagazine.com/review/trigeo-security-information-manager-sim/
-
https://www.sans.org/reading-room/whitepapers/tools/netforensics-security-information-management-solution-408
-
https://searchitchannel.techtarget.com/news/450304496/EiQ-Networks-offers-managed-SIEM-for-cloud-channel-partners
-
https://www.splunk.com/en_us/resources/videos/splunk-for-security-vs-siem.html
-
https://prwire.com.au/pr/16314/tripwire-introduces-next-generation-security-information-and-event-management-siem-solution-with-tripwire-log-center
-
https://cybersecurity.att.com/products/ossim
-
https://www.draware.dk/files/docs/users/Line/correlog-siem-server-brochure.pdf
-
https://www.s21sec.com/managed-soc-siem-as-a-service/
-
https://www.helpsystems.com/products/siem-software
-
https://www.huntsmansecurity.com/resource/product-brochures/next-gen-siem/
-
https://www.solarwinds.com/security-event-manager
-
https://www.tibco.com/sites/tibco/files/resources/wp-siem-final.pdf
-
https://www.eventtracker.com/EventTracker/media/EventTracker/Files/whitepapers/WP-SIEM-Simplified.pdf
-
https://www.fortinet.com/products/siem/fortisiem
-
https://www.blackstratus.com/siem-security-solutions/
-
https://www.manageengine.com/products/eventlog/?pos=MEtab&cat=ITS &loc=tab&prev=AB2
-
https://www.fireeye.com/products/helix/siem.html
-
https://www.venusense.com/type/USM/
-
https://www.rapid7.com/products/insightidr/
-
https://www.exabeam.com/product/
-
https://www.securonix.com/products/next-generation-siem/
-
https://www.logpoint.com/en/
-
http://en.hansight.com/product/enterprise
-
http://oa.upm.es/65634/1/TESIS_MASTER_MARIANNE_AYMARD_CUELLO.pdf
-
https://www.infosys.com/about/knowledge-institute/insights/documents/future-tomorrow.pdf
-
https://www.securonix.com/web/wp-content/uploads/2018/08/Security_Analytics_For_Dummies_Securonix_Special_Edition.pdf
-
https://www.varonis.com/blog/what-is-siem/
-
https://www.brighttalk.com/
-
http://data.consilium.europa.eu/doc/document/ST-9565-2015-INIT/en/pdf
-
http://dx.doi.org/10.1016/j.cose.2020.102165
-
http://dx.doi.org/10.1504/IJESDF.2012.048412
-
http://blogs.gartner.com/augusto-barros/2017/03/31/siem-correlation-is-overrated/
-
http://searchsecurity.techtarget.com/feature/Seven-questions-to-ask-before-buying-SIEM-products
-
http://dx.doi.org/10.4018/ijsse.2013100102
-
http://dx.doi.org/10.1109/TSE.2007.1002
-
https://www.thinkmind.org/articles/cyber_2017_4_20_80046.pdf
-
https://cybersec4europe.eu/publications/deliverables/
-
https://gallery.logrhythm.com/independent-white-papers/sans-an-evaluators-guide-to-next-gen-siem-independent-white-paper-2018.pdf
-
https://www.esri.com/~/media/Files/Pdfs/library/white papers/pdfs/geospatial-approach-cybersecurity.pdf
-
http://dx.doi.org/10.1109/TVCG.2011.197
-
https://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM
-
https://searchdatacenter.techtarget.com/tip/Get-to-know-SIEM-software-basics-and-benefits?_ga=2.147979831.1077932165.1624014464-278441071.1618836279
-
https://f.hubspotusercontent30.net/hubfs/8156085/Splunk.%20Top%205%20SIEM%20trends%20to%20Watch%20in%202021.pdf
-
http://www.free-management-ebooks.com/dldebk-pdf/fme-pestle-analysis.pdf
-
https://www.ecs-org.eu/cppp
-
https://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/?sh=14989bc427ea
-
https://www.economist.com/special-report/2016/09/15/why-giants-thrive
-
https://www.raconteur.net/why-smes-are-big-targets-for-cyber-crime/
-
http://dx.doi.org/10.1080/03601277.2016.1205408
-
https://wearesocial.com/uk/special-reports/digital-in-2016
-
http://www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/
-
https://documents.trendmicro.com/assets/wp/wp_below_the_surface.pdf
-
http://dx.doi.org/10.1016/j.inffus.2013.04.009
-
http://www.lehigh.edu/~inengrit/dropbox/eac1113/Cisco_Internet-of-Everything.pdf
-
https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
-
http://ec.europa.eu/newsroom/just/document.cfm?doc_id=41524
-
https://www.pdpjournals.com/docs/88612.pdf
-
https://www.darkreading.com/threat-intelligence/future-of-the-siem-/d/d-id/1328457
-
http://dx.doi.org/10.1016/j.comnet.2021.108008
-
http://dx.doi.org/10.3233/JCS-130475
-
http://dx.doi.org/10.1002/spe.2180
-
http://dx.doi.org/10.9790/0661-16535761
-
http://dx.doi.org/10.1016/j.procs.2016.08.121
-
https://em360tech.com/top-10/top-10-threat-intelligence-platforms
-
https://digitalguardian.com/blog/what-endpoint-detection-and-response-definition-endpoint-detection-response
-
https://digitalguardian.com/blog/what-next-generation-firewall-learn-about-differences-between-ngfw-and-traditional-firewalls
-
https://www.inquisitllc.com/wp-content/uploads/2020/05/White-Paper-Security-Orchestration-Automation-and-Response.pdf
-
https://www.siemplify.co/blog/what-is-security-automation/
-
https://www.trustradius.com/incident-response
-
https://www.dflabs.com/wp-content/uploads/2020/12/DFLabs_White_Paper_Gartner_Market_Guide_for_SOAR_Solutions.pdf
-
http://dx.doi.org/10.1016/S1353-4858(19)30123-0
-
http://dx.doi.org/10.1016/j.jisa.2017.12.001
-
https://paper.bobylive.com/Security/threat-intelligence-handbook-second-edition.pdf
-
https://www.spamhaus.com/custom-content/uploads/2020/04/2019-The-Value-of-Threat-Intelligence-White-Paper-LR.pdf
-
http://dx.doi.org/10.32604/iasc.2021.016240
-
https://solutionsreview.com/security-information-event-management/ai-in-siem-the-benefits-for-enterprises-of-all-sizes/
-
https://www.midlandinfosys.com/pdf/qradar-cybersecurity-ai-qradar-siem-wp.pdf
-
https://solutionsreview.com/security-information-event-management/machine-learning-siem-security-analytics-know
-
https://www.business2community.com/celebrity/10-ways-ai-and-machine-learning-are-improving-endpoint-security-02247235
-
http://dx.doi.org/10.1016/S1353-4858(21)00039-8
-
http://dx.doi.org/10.1016/j.future.2020.07.015
-
https://www.forbes.com/sites/forbestechcouncil/2021/03/31/similarities-and-differences-between-xdr-and-siem/?sh=415ace6f79c1
-
https://www.oecd.org/daf/inv/investment-policy/40700392.pdf
-
http://dx.doi.org/10.1109/ACCESS.2017.2740402
-
http://dx.doi.org/10.1007/978-3-030-12786-2_1
-
https://www.exabeam.com/library/protect-critical-infrastructure-insider-threats-security-intelligence/
-
https://www.mckinsey.com/business-functions/risk/our-insights/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities
-
https://logrhythm.com/blog/securing-water-critical-infrastructure-detecting-a-life-threatening-attack-part-1/
-
https://logrhythm.com/blog/securing-water-critical-infrastructure-part-2/
-
https://www.waterisac.org/system/files/articles/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C_0.pdf
-
https://www.dhs.gov/xlibrary/assets/Transportation_Base_Plan_5_21_07.pdf
-
https://www.marsh.com/uk/insights/research/cyber-risk-in-the-transportation-industry.html
-
https://piernext.portdebarcelona.cat/en/technology/are-ports-prepared-to-deal-with-threats-from-hackers/
-
https://www.ibm.com/downloads/cas/PLWZ76MM
-
https://ec.europa.eu/docsroom/documents/38941/attachments/1/ translations/en/renditions/native
-
https://www.fortinet.com/blog/industry-trends/why-siem-solutions-are-essential-to-securing-healthcare-networks
-
https://hitinfrastructure.com/news/how-siem-solutions-work-to-secure-health-it-infrastructure
-
https://solutionsreview.com/security-information-event-management/how-siem-solutions-can-help-secure-financial-enterprises/
-
https://info.datacomm.com/siem-use-cases-for-financial-institutions
-
https://logsentinel.com/solutions/logsentinel-for-the-financial-sector/?cookie-state-change=1621516381127
-
https://searchsecurity.techtarget.com/essentialguide/How-to-define-SIEM-strategy-management-and-success-in-the-enterprise
-
https://www.mdpi.com/article/10.3390/s21144759?type=check_update&version=2
-
http://doi.org/10.3390/s21144759AcademicEditors:AlexiosMylonasandNikolaosPitropakisReceived:3June2021Accepted:8July2021Published:12July2021Publisher'sNote:MDPIstaysneutralwithregardtojurisdictionalclaimsinpublishedmapsandinstitutionalaf
-
http://atos.net
-
http://doi.org/10.3390/s21144759https://www.mdpi.com/journal/sensors
-
http://searchsecurity.techtarget.com/accessedon12January2021
-
http://www.infotech.com/accessedon12January2021
-
https://www.nokia.com/networks/solutions/netguard-adaptive-security-operations/accessedon7June2021
-
https://www.splunk.com/en_us/solutions/solution-areas/security-and-fraud/adaptive-response-initiative.htmlaccessedon7June2021
-
https://www.iacdautomate.org/accessedon27May2021
-
https://logrhythm.com/products/features/ai-engine/accessedon28May2021
-
https://www.midlandinfosys.com/ibm-power/all-categories/ai-security-siem-qradar-uba.htmlaccessedon28May2021
-
https://www.fortinet.com/resources/cyberglossary/critical-infrastructure-protectionaccessedon1April2021
-
https://www.waterisac.org/system/
-
https://www.novell.com/docrep/documents/yuufbom4u2/gartner_magic_quadrant_siem_report_may2011.pdf
-
https://www.bwdigitronik.ch/application/
-
http://002les.wordpress.com/2018/03/magic-quadrant-for-security-information-and-event-3-dec-2018.pdf
-
https://ftpdocs.broadcom.com/cadocs/0/CA%20Enterprise%20Log%20Manager%20r12%201%20SP3-ENU/Bookshelf_Files/PDF/CAELM_Admin_ENU.pdf
-
http://M.net
-
https://www.draware.dk
-
https://www.tibco.com/sites/tibco/
-
https://www.eventtracker.com/EventTracker/media/EventTracker/Files/whitepapers/WP-SIEM-Simpli
-
https://www.manageengine.com/products/eventlog/?pos=MEtab&cat=ITS&loc=tab&prev=AB2
-
http://002reeye.com/products/helix/siem.html
-
https://www.brighttalk.com
-
https://www.esri.com/~/media/Files/Pdfs/library/whitepapers/pdfs/geospatial-approach-cybersecurity.pdf
-
https://searchsecurity.techtarget.com/de
-
https://searchdatacenter.techtarget.com/tip/Get-to-know-SIEM-software-basics-and-bene
-
https://digitalguardian.com/blog/what-endpoint-detection-and-response-de
-
https://digitalguardian.com/blog/what-next-generation-
-
http://003abs.com/wp-content/uploads/2020/12/DFLabs_White_Paper_Gartner_Market_Guide_for_SOAR_Solutions.pdf
-
https://solutionsreview.com/security-information-event-management/ai-in-siem-the-bene
-
http://HavingSIEMtechnologycopewithnetworkheterogeneity.ar
-
https://logrhythm.com/blog/securing-water-critical-infrastructure-detecting-a-life-threatening-attack-part-1/andhttps://logrhythm.com/blog/securing-water-critical-infrastructure-part-2/
-
https://ec.europa.eu/docsroom/documents/38941/attachments/1/translations/en/renditions/native
-
https://solutionsreview.com/security-information-event-management/how-siem-solutions-can-help-secure-
-
https://info.datacomm.com/siem-use-cases-for-
-
https://logsentinel.com/solutions/logsentinel-for-the-
-
http://searchsecurity.techtarget.com
-
http://www.infotech.com
-
https://searchsecurity.techtarget.com/essentialguide/How-to-de
- Show all
-