Behavioral task
behavioral1
Sample
eeca9773654549f46c47c281bdcce147490fdf7fe6f6748f2823479d5dc39cd1.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eeca9773654549f46c47c281bdcce147490fdf7fe6f6748f2823479d5dc39cd1.pdf
Resource
win10v2004-20240221-en
General
-
Target
eeca9773654549f46c47c281bdcce147490fdf7fe6f6748f2823479d5dc39cd1
-
Size
20.7MB
-
MD5
7c51e093a03819dbd6db7894835bc7fb
-
SHA1
673ae0e066196031af3409c66654ef15d700e834
-
SHA256
eeca9773654549f46c47c281bdcce147490fdf7fe6f6748f2823479d5dc39cd1
-
SHA512
65ef619fb37642d2fc76731d37f340df1b18bb4f64b50b65fa7abe95b78107befa0b60bcf404f1d453b5eaeb2d802c20b8116b4318c52942906faf30c751c2c9
-
SSDEEP
393216:OYTNH9FB4uZqwcZ4sYLIYoSpa3W4j5RxiCxcGjUaqlzXN:OYTNdAwFd23Wq11jHqlzXN
Malware Config
Signatures
Files
-
eeca9773654549f46c47c281bdcce147490fdf7fe6f6748f2823479d5dc39cd1.pdf
-
http://www.packt.com
-
https://packt.link/SecNet
-
https://packt.link/INq4w
-
http://www.packtpub.com/submit-errata
-
http://authors.packtpub.com
-
https://packt.link/r/1804613673
-
https://packt.link/free-ebook/9781804613672
-
https://www.packtpub.com/product/cybersecurity-threats-malware-trends-and-strategies/9781800206014
-
https://www.microsoft.com/security/blog/2021/01/27/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth/
-
https://docs.microsoft.com/en-us/security/cybersecumrity-reference-architecture/mcra
-
https://www2.deloitte.com/us/en/insights/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.html
-
https://nvd.nist.gov/vuln
-
https://www.cisecurity.org/cis-benchmarks/
-
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf
-
https://techcommunity.microsoft.com/t5/azure-active-directoryidentity/your-pa-word-doesn-t-matter/ba-p/73198
-
https://www.microsoft.com/securityinsights/Phishing
-
https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi
-
https://attack.mitre.org/
-
https://www.bbc.com/news/av/business-22348290
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
-
https://www.first.org/tlp/
-
https://www.cisa.gov/tlp
-
https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html
-
https://docs.oasis-open.org/cti/stix/v2.1/stix-v2.1.html
-
https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html
-
https://docs.oasisopen.org/cti/taxii/v2.1/taxii-v2.1.html
-
https://cve.mitre.org/cve/search_cve_list.html
-
https://nvd.nist.gov
-
https://www.first.org/cvss/
-
https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf
-
https://www.cve.org/
-
https://nvd.nist.gov/vuln/search
-
https://www.cvedetails.com/
-
https://www.cve.org/PartnerInformation/ListofPartners
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
https://ubuntu.com/security/cves
-
https://wiki.ubuntu.com/Releases
-
https://www.cve.org/ResourcesSupport/AllResources/CNARules
-
https://michaelhowardsecure.blog/2021/05/09/the-best-security-advice-i-can-give/
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8653
-
https://www.first.org/cvss/specification-document
-
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
-
https://cve.mitre.org/about/cve_and_nvd_relationship.html
-
https://csrc.nist.gov/csrc/media/Publications/Shared/documents/itl-bulletin/itlbul2000-07.pdf
-
https://www.youtube.com/watch?time_continue=20&v=3Sx0uJGRQ4s
-
https://www.cvedetails.com/how-does-it-work.php
-
https://www.tripwire.com/state-of-security/featured/history-common-vulnerabilities-exposures-cve/
-
https://www.cvedetails.com/index.php
-
https://www.cve.org/ProgramOrganization/CNAs
-
https://www.cvedetails.com/top-50-products.php
-
https://www.cvedetails.com/top-50-vendors.php
-
https://www.microsoft.com/en-us/securityengineering/sdl
-
https://www.kb.cert.org/vuls/id/930724
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
-
https://nvd.nist.gov/General/News/cisa-exploit-catalog
-
https://www.cvedetails.com/vendor/26/Microsoft.html
-
https://www.securityweek.com/microsoft-shutting-down-trustworthy-computing-unit
-
https://www.youtube.com/watch?v=PjbGojjnBZQ
-
https://www.cvedetails.com/vendor/93/Oracle.html
-
https://www.cvedetails.com/product/15031/GoogleChrome.html?vendor_id=122
-
https://www.cvedetails.com/vendor/23/Debian.html
-
https://www.cvedetails.com/vendor/49/Apple.html
-
https://www.cvedetails.com/product-list/vendor_id-49/Apple.html
-
https://www.cvedetails.com/product/15556/Apple-Iphone-Os.html?vendor_id=49
-
https://www.cvedetails.com/product/156/Apple-MacOs-X.html?vendor_id=49
-
https://www.cvedetails.com/product/2935/AppleSafari.html?vendor_id=49
-
https://www.cvedetails.com/product/19997/GoogleAndroid.html?vendor_id=1224
-
https://www.cvedetails.com/product/15031/GoogleChrome.html?vendor_id=1224
-
https://www.cvedetails.com/product-list/vendor_id-1224/Google.html
-
https://www.cvedetails.com/product/47/Linux-LinuxKernel.html?vendor_id=33
-
https://www.cvedetails.com/product-list/product_type-/ firstchar-/vendor_id-26/page-1/products-by-name.html?sha=4b975b df63b781745f458928790e4c8fd6a77f94&order=3&trc=525
-
https://www.cvedetails.com/product/32238/Microsoft-Windows-10.html?vendor_id=26
-
https://www.cvedetails.com/product/34965/ Microsoft-Windows-Server-2016.html?vendor_id=26
-
https://www.cvedetails.com/product/32367/Microsoft-Edge.html?vendor_id=26
-
https://biztechmagazine.com/article/2016/04/understanding-security-benefits-windows-10
-
https://www.cvedetails.com/product/20550/Canonical-Ubuntu-Linux.html?vendor_id=4781
-
https://www.cvedetails.com/product/3264/MozillaFirefox.html?vendor_id=452
-
https://blogs.windows.com/windowsexperience/2020/01/15/new-year-new-browser-the-new-microsoft-edge-is-out-of-preview-and-now-available-for-download/
-
https://www.microsoft.com/en-us/wdsi/threats
-
https://www.aljazeera.com/news/middleeast/2014/01/iraq-government-loses-controlfallujah-20141414625597514.html
-
https://www.av-test.org/fileadmin/pdf/security_report/AV-TEST_Security_Report_2018-2019.pdf
-
https://www.av-test.org/fileadmin/pdf/security_report/AV-TEST_Security_Report_2019-2020.pdf
-
https://www.av-test.org/en/about-the-institute/
-
https://www.av-test.org/en/statistics/malware/
-
https://www.av-test.org/en/about-the-institute/publications/
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroz
-
http://download.microsoft.com/download/c/e/f/cefb7bf3-de0c-4dcb-995a-c1c69659bf49/sdlprogressreport.pdf
-
https://www.reuters.com/article/us-turkey-protest/police-fire-tear-gas-atistanbul-anti-government-protest-idUSBREA1L0UV20140222
-
https://www.computerworld.com/article/3199373/windows-by-the-numbers-windows-10-continuesto-cannibalize-windows-7.html
-
https://krebsonsecurity.com/2017/08/carbon-emissionsoversharing-bug-puts-security-vendor-back-in-spotlight/
-
https://go.microsoft.com/fwlink/p/?linkid=2036139&clcid=0x409&culture=en-us&country=us
-
https://go.microsoft.com/fwlink/p/?linkid=2036108&clcid=0x409&culture=en-us&country=us
-
https://go.microsoft.com/fwlink/p/?linkid=2036319&clcid=0x409&culture=en-us&country=us
-
https://go.microsoft.com/fwlink/p/?linkid=2036113&clcid=0x409&culture=en-us&country=us
-
https://go.microsoft.com/fwlink/p/?linkid=2045580&clcid=0x409&culture=en-us&country=us
-
https://go.microsoft.com/fwlink/p/?linkid=2073690&clcid=0x409&culture=en-us&country=us
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/cybersecurity-industry-partners
-
https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier%3aWin32%2fDiplugem
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907
-
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/directaccess/directaccess
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/criteria
-
https://www.microsoft.com/securityinsights/Malware
-
https://www.microsoft.com/en-us/security/business/security-intelligence-report
-
https://www.microsoft.com/en-us/security/operations/security-intelligencereport
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:DOS/Petya.A&threatId=-2147257025
-
https://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
-
https://support.microsoft.com/en-us/help/890830/remove-specific-prevalent-malware-with-windows-malicioussoftware-remo
-
https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Zlob&threatId=16998
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:Win32/Reveton.T!lnk&threatId=-2147285370
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopediadescription?name=win32%2frotbrow
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Virus%3aWin32%2fSality
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Sefnit
-
https://support.microsoft.com/en-gb/help/17443/windows-internet-explorer-smartscreen-faq
-
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Taterf
-
https://support.microsoft.com/en-us/help/826955/virus-alert-about-the-blasterworm-and-its-variants
-
https://nvd.nist.gov/vuln/detail/CVE2019-0708
-
https://www.microsoft.com/security/blog/2011/06/27/defending-against-autorun-attacks/
-
https://www.microsoft.com/security/blog/2013/09/24/examining-koreasrollercoaster-threat-landscape/
-
https://www.microsoft.com/en-us/security/blog/2012/07/20/new-microsoft-malware-protection-center-threat-report-published-eyestye/
-
https://www.ria.ee/sites/default/files/content-editors/kuberturve/ria-csa-2018.pdf
-
https://www.theguardian.com/technology/2017/sep/13/us-government-bans-kaspersky-lab-russian-spying
-
https://www.nytimes.com/2014/08/11/world/europe/erdogan-turkeys-premier-wins-presidential-election.html?_r=0/
-
https://www.cisa.gov/critical-infrastructure-sectors
-
https://en.wikipedia.org/wiki/2014_in_Iraq
-
https://en.wikipedia.org/wiki/2014_in_Pakistan
-
https://en.wikipedia.org/wiki/NextGeneration_Secure_Computing_Base
-
https://en.wikipedia.org/wiki/Timeline_of_the_Arab_Spring
-
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-threats-jun-2021.pdf
-
https://www.sophos.com/en-us/content/security-threat-report
-
https://www.nytimes.com/2020/08/12/climate/tropical-soils-climate-change.html
-
https://www.pbs.org/newshour/economy/colonial-pipeline-confirms-it-paid-4-4-million-to-hackers
-
https://www.bbc.com/news/business-57050690
-
https://www.microsoft.com/security/blog/2016/04/22/ransomware-understanding-the-risk/
-
https://urlhaus.abuse.ch/statistics/
-
https://d1.awsstatic.com/whitepapers/Security/DDoS_White_Paper.pdf
-
https://arstechnica.com/information-technology/2007/05/massive-ddos-attacks-target-estonia-russia-accused/
-
https://transparencyreport.google.com/safe-browsing/overview?unsafe=dataset:0;series:malware,phishing;start:1148194800000;end:1587279600000&lu=unsafe
-
https://transparencyreport.google.com/safe-browsing/search?hl=en
-
https://transparencyreport.google.com/archive/safe-browsing/malware?autonomous_scan_history=systemId:18779;dataset:0&lu=global_malware&global_malware=time:q
-
https://www.microsoft.com/security/blog/2011/03/17/microsoft-takedown-of-rustock-botnet/
-
https://github.blog/2018-03-01-ddos-incident-report/
-
http://www.microsoft.com/sir
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2GQwi
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWt530
-
https://info.microsoft.com/ww-landing-M365-SIR-v24-Report-eBook.html?lcid=en-us
-
https://www.microsoft.com/securityinsights/Driveby
-
https://support.microsoft.com/en-us/windows/help-protect-my-pc-with-microsoft-defender-offline-9306d528-64bf-4668-5b80-ff533f183d6c
-
https://www.microsoft.com/en-us/security/blog/2018/08/09/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks/
-
https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why
-
https://www.itworldcanada.com/article/searchable-database-of-1-4-billion-stolen-credentials-found-on-dark-web/399810
-
https://threatpost.com/typosquatters-target-apple-mac-users-with-new-om-domain-scam/116768/
-
https://urlhaus.abuse.ch/about/
-
https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-tmatter/ba-p/731984#
-
https://apwg.org/trendsreports/
-
https://www.microsoft.com/security/blog/2020/03/20/protecting-against-coronavirus-themed-phishing-attacks/
-
https://blogs.jpcert.or.jp/en/2022/05/phishing2021.html
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v
-
https://www.pcmag.com/news/google-fends-off-record-breaking-ddos-attack
-
https://arstechnica.com/information-technology/2022/01/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack/
-
https://venturebeat.com/security/ukraine-weve-repelled-nonstop-ddos-attacks-from-russia/
-
https://www.ietf.org/about/mission/
-
https://justice.gc.ca/eng/csj-sjc/rfc-dlc/ccrf-ccdl/check/art7.html
-
https://web.archive.org/web/20141018141249/http://www.ambafrance-us.org/spip.php?article620
-
https://www.defense.gov/About
-
https://www.international.gc.ca/global-affairs-affaires-mondiales/home-accueil.aspx?lang=eng
-
https://www.afp.gov.au/about-us/our-organisation
-
https://www.gov.uk/government/organisations/ministry-of-justice/about
-
https://www.bsi.bund.de/EN/Home/home_node.html
-
https://www.usaspending.gov/explorer/budget_function
-
https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=152153
-
https://www.nist.gov/about-nist
-
https://csrc.nist.gov/projects/cryptographic-module-validation-program
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1271.pdf
-
https://www.ietf.org/about/who/
-
https://www.iso.org/about-us.html
-
https://www.iso.org/standard/76559.html?browse=tc
-
https://www.tessian.com/blog/biggest-gdpr-fines-2020/
-
https://www.fbi.gov/file-repository/law-enforcement-cyber-incident-reporting.pdf/view
-
https://www.fbi.gov/news/stories/wray-announces-fbi-cyber-strategy-at-cisa-summit-091620
-
https://www.ic3.gov/Media/PDF/Y2020/PSA201008.pdf
-
https://www.ferc.gov/news-events/news/statement-ferc-chairman-richard-glick-chairman-glick-and-commissioner-clements
-
https://www.epa.gov/newsreleases/epa-issues-fuel-waiver-twelve-states-and-district-columbia-impacted-colonial-pipeline
-
https://www.dhs.gov/news/2021/05/12/statement-secretary-mayorkas-approval-jones-act-waiver-response-eastern-seaboard-oil
-
https://www.transportation.gov/briefing-room/usdot-announces-additional-measures-help-states-areas-affected-colonial-pipeline
-
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
-
https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks/
-
https://www.nsa.gov/About/Mission-Combat-Support/
-
https://www.dni.gov/index.php/who-we-are/organizations/enterprise-capacity/chco/chco-related-menus/chco-related-links/recruitment-and-outreach/217-about/organization/icig-pages/2660-icig-fiorc
-
https://www.nsa.gov/Cybersecurity/Overview/
-
https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010
-
https://www.cbsnews.com/news/china-military-unit-behind-many-hacking-attacks-on-us-cybersecurity-firm-says/
-
https://www.brookings.edu/blog/brookings-now/2014/05/22/unit-61398-indictment-exposes-real-faces-and-names-behind-shanghai-keyboards-used-to-steal-from-u-s-businesses/
-
https://www.adobe.com/legal/lawenforcementrequests/transparency.html
-
https://aws.amazon.com/compliance/amazon-information-requests/
-
https://www.apple.com/legal/transparency/
-
https://www.cisco.com/c/en/us/about/trust-center/transparency.html
-
https://transparency.facebook.com/government-data-requests
-
https://transparencyreport.google.com/user-data/overview
-
https://www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-report
-
https://transparencyreport.google.com/about
-
https://transparencyreport.google.com/user-data/us-national-security
-
https://www.microsoft.com/en-us/corporate-responsibility/us-national-security-orders-report
-
https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/adequacy-decisions_en/
-
https://www.youtube.com/watch?v=78qFK-r7WBI
-
https://d1.awsstatic.com/certifications/Information_Request_Report_June_2018.pdf
-
https://d1.awsstatic.com/Information_Request_Report_December_2021_bia.pdf
-
https://www.amazon.com/gp/help/customer/display.html?nodeId=GYSDRGWQ2C2CRYEF
-
https://www.apple.com/legal/transparency/account.html
-
https://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
-
https://www.businessinsider.com/amazon-eu-fine-data-privacy-gdpr-luxembourg-european-union-2021-7
-
https://www.reuters.com/investigates/special-report/usa-spying-raven/
-
https://uk.pcmag.com/social-media/142547/record-setting-gdpr-fines-are-drops-in-the-bucket-for-big-tech?amp=1
-
https://www.law.cornell.edu/wex/fourth_amendment
-
https://www.law.cornell.edu/wex/probable_cause
-
https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/australia-united-states-cloud-act-agreement
-
https://ec.europa.eu/info/policies/justice-and-fundamental-rights/criminal-justice/e-evidence-cross-border-access-electronic-evidence_en
-
https://www.politico.com/story/2014/05/france-intellectual-property-theft-107020
-
https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline
-
https://www.reuters.com/article/us-france-wikileaks/nsa-spied-on-french-presidents-wikileaks-idUSKBN0P32EM20150623
-
https://www.reuters.com/article/us-usa-china-huawei/u-s-accuses-huawei-cfo-of-iran-sanctions-cover-up-hearing-adjourned-idUSKBN1O60FY
-
https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
-
https://www.ft.com/content/7f2f39b2-733e-11e9-bf5c-6eeb837566c5
-
https://transparency.fb.com/data/government-data-requests/?source=https%3A%2F%2Ftransparency.facebook.com%2Fgovernment-data-requests
-
https://www.archives.gov/founding-docs/bill-of-rights/what-does-it-say
-
https://www.nsa.gov/Signals-Intelligence/
-
https://www.nsa.gov/news-features/declassified-documents/ukusa/
-
https://www.nsa.gov/Signals-Intelligence/FISA/
-
https://uk.reuters.com/article/us-usa-encryption-facebook/u-s-senators-threaten-facebook-apple-with-encryption-regulation-idUKKBN1YE2CK
-
http://peterswire.net/wp-content/uploads/mutual-legal-assistance-case-study-US-France.pdf
-
https://www.youtube.com/watch?v=LbxekyZWx1o
-
https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
-
https://www.wsj.com/articles/punt-on-patriot-act-sets-up-new-push-by-opponents-11574418600
-
https://blogs.microsoft.com/on-the-issues/2017/10/23/doj-acts-curb-overuse-secrecy-orders-now-congress-turn/
-
https://www.microsoft.com/en-us/microsoft-365/blog/2019/11/19/5-attributes-successful-teams/
-
https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
-
https://www.congress.gov/106/cdoc/tdoc17/CDOC-106tdoc17.pdf
-
https://www.congress.gov/108/cdoc/tdoc27/CDOC-108tdoc27.pdf
-
https://www.congress.gov/109/cdoc/tdoc13/CDOC-109tdoc13.pdf
-
https://www.justice.gov/criminal-oia/cloud-act-resources
-
https://www.justice.gov/ag/page/file/1207496/download#Agreement%20between%20the%20Government%20of%20the%20United%20States%20of%20America%20and%20the%20Government%20of%20the%20United%20Kingdom%20of%20Great%20Britain%20and%20Northern%20Ireland%20on%20Access
-
https://www.justice.gov/opa/pr/joint-statement-announcing-united-states-and-australian-negotiation-cloud-act-agreement-us
-
https://www.justice.gov/opa/pr/us-and-uk-sign-landmark-cross-border-data-access-agreement-combat-criminals-and-terrorists
-
https://findit.state.gov/search?utf8=%E2%9C%93&affiliate=dos_stategov&sort_by=&query=%22Mutual+Legal+Assistance+in+Criminal+Matters%22
-
https://www.usa.gov/federal-agencies
-
https://wikileaks.org/nsa-germany/
-
https://wikileaks.org/nsa-brazil/
-
https://wikileaks.org/nsa-france/
-
https://wikileaks.org/nsa-japan/
-
https://en.wikipedia.org/wiki/Illegals_Program
-
https://en.wikipedia.org/wiki/Signals_intelligence_by_alliances,_nations_and_industries
-
https://aws.amazon.com/security/zero-trust/
-
https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-frameworks.html
-
https://storage.googleapis.com/pub-tools-public-publication-data/pdf/43231.pdf
-
https://www.microsoft.com/en-us/security/business/zero-trust
-
https://www.computerweekly.com/news/450301845/One-in-five-businesses-hit-by-ransomware-are-forced-to-close-study-shows
-
https://cloud.google.com/blog/products/identity-security/applying-zero-trust-to-user-access-and-production-services
-
https://lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf
-
https://learn.microsoft.com/en-us/security/compass/privileged-access-strategy
-
https://www.microsoft.com/en-us/securityengineering/sdl/
-
https://www.microsoft.com/en-us/security/business/zero-trust/
-
https://attack.mitre.org/resources/faq/
-
https://csrc.nist.gov/Projects/cybersecurity-framework/nist-cybersecurity-framework-a-quick-start-guide
-
https://www.nist.gov/cyberframework
-
https://www.paconsulting.com/services/build-brands-products-and-services
-
https://www.unifiedkillchain.com/assets/The-Unified-Kill-Chain.pdf
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/715778/May-2018_Government-Security-Classifications-2.pdf
-
https://www.govinfo.gov/content/pkg/DCPD-200901022/pdf/DCPD-200901022.pdf
-
https://www.virusbulletin.com/
-
https://en.wikipedia.org/wiki/Rainbow_table
-
https://learn.microsoft.com/en-us/compliance/assurance/assurance-human-resources?view=o365-worldwide
-
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
-
https://attack.mitre.org/tactics/TA0043/
-
https://attack.mitre.org/tactics/TA0001/
-
https://attack.mitre.org/tactics/TA0002/
-
https://attack.mitre.org/tactics/TA0003/
-
https://attack.mitre.org/tactics/TA0004/
-
https://attack.mitre.org/tactics/TA0011/
-
https://attack.mitre.org/tactics/TA0007/
-
https://attack.mitre.org/tactics/TA0010/
-
https://attack.mitre.org/tactics/TA0040/
-
https://attack.mitre.org/tactics/enterprise/
-
https://attack.mitre.org/techniques/enterprise/
-
https://attack.mitre.org/mitigations/enterprise/
-
https://research.ijcaonline.org/volume63/number6/pxc3885202.pdf
-
https://msrc-blog.microsoft.com/2010/12/08/on-the-effectiveness-of-dep-and-aslr/
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices
-
https://www.microsoft.com/en-us/download/details.aspx?id=17148
-
https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/classic-intrusion-analysis-frameworks-for-aws-environments.html
-
https://medium.com/mitre-attack/getting-started-with-attack-cti-4eb205be4b2f
-
https://medium.com/mitre-attack/getting-started-with-attack-detection-a8e49e4960d0
-
https://medium.com/mitre-attack/getting-started-with-attack-red-29f074ccf7e3
-
https://medium.com/mitre-attack/getting-started-with-attack-assessment-cc0b01769cb4
-
https://attack.mitre.org/resources/adversary-emulation-plans/
-
https://order-of-the-engineer.org/
-
https://www.isc2.org/-/media/ISC2/Certifications/Domain-Refresh/CISSP-Domain-Refresh.ashx
-
https://aws.amazon.com/blogs/security/how-to-use-amazon-alexa-to-get-amazon-guardduty-statistics-and-findings/
-
https://aws.amazon.com/about-aws/global-infrastructure/
-
https://cloud.google.com/compute/docs/regions-zones/
-
https://azure.microsoft.com/explore/global-infrastructure/
-
https://docs.aws.amazon.com/cli/latest/userguide/security.html
-
https://aws.amazon.com/compliance/programs/
-
https://cloud.google.com/security/compliance/
-
https://www.microsoft.com/en-us/trust-center/compliance/compliance-overview
-
https://aws.amazon.com/blogs/security/whitepaper-available-classic-intrusion-analysis-frameworks-for-aws-environments/
-
https://aws.amazon.com/blogs/publicsector/goldilocks-zone-disaster-recovery-business-continuity-planning-disaster-preparedness/
-
https://aws.amazon.com/blogs/architecture/disaster-recovery-dr-architecture-on-aws-part-i-strategies-for-recovery-in-the-cloud/
-
https://aws.amazon.com/blogs/architecture/disaster-recovery-dr-architecture-on-aws-part-ii-backup-and-restore-with-rapid-recovery/
-
https://aws.amazon.com/blogs/architecture/disaster-recovery-dr-architecture-on-aws-part-iii-pilot-light-and-warm-standby/
-
https://aws.amazon.com/blogs/architecture/disaster-recovery-dr-architecture-on-aws-part-iv-multi-site-active-active/
-
https://aws.amazon.com/ec2/nitro/
-
https://aws.amazon.com/ec2/nitro/nitro-enclaves/
-
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/data-protection.html
-
https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-overview
-
https://azure.microsoft.com/en-us/solutions/confidential-compute/#overview
-
https://cloud.google.com/security/encryption
-
https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms
-
https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html
-
https://aws.amazon.com/what-is-aws
-
https://www.ansible.com/
-
https://aws.amazon.com/blogs/compute/fleet-management-made-easy-with-auto-scaling/
-
https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.html
-
https://aws.amazon.com/cloudformation/
-
https://aws.amazon.com/cloudtrail/
-
https://aws.amazon.com/kms/
-
https://aws.amazon.com/secrets-manager/
-
https://docs.aws.amazon.com/systems-manager/latest/userguide/monitoring-cloudtrail-logs.html
-
https://aws.amazon.com/getting-started/hands-on/remotely-run-commands-ec2-instance-systems-manager/
-
https://docs.aws.amazon.com/cli/latest/userguide/cli-chapusing.html
-
https://www.chef.io/products/chef-infra/
-
https://cloud.google.com/logging/docs/audit
-
https://cloud.google.com/kms/
-
https://cloud.google.com/composer
-
https://cloud.google.com/blog/products/identity-security/introducing-google-clouds-secret-manager
-
https://cloud.google.com/sdk/gcloud/reference/compute/instances/create
-
https://www.terraform.io/
-
https://docs.microsoft.com/en-us/azure/automation/automation-intro
-
https://docs.microsoft.com/en-us/azure/azure-monitor/overview
-
https://azure.microsoft.com/en-us/services/
-
https://azure.microsoft.com/en-us/services/key-vault/
-
https://docs.microsoft.com/en-us/learn/modules/manage-secrets-with-azure-key-vault/
-
https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/start
-
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
-
https://attack.mitre.org/matrices/enterprise/cloud/
-
https://owasp.org/www-project-top-ten/
-
https://puppet.com/products/puppet-enterprise/
-
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/CloudComputing/ComplianceControlsCatalogue-Cloud_Computing-C5.html
-
http://packt.com
-
https://www.packtpub.com/product/the-cybersecurity-playbook-for-modern-enterprises/9781803248639?_ga=2.264479567.1989018987.1673927746-1060321437.1657688636
-
https://www.packtpub.com/product/cybersecurity-and-privacy-law-handbook/9781803242415?_ga=2.232382687.1989018987.1673927746-1060321437.1657688636
-
https://www.packtpub.com/product/cybersecurity-attack-and-defense-strategies-third-edition/9781803248776
-
http://978-1-80461-367-2www.packt.com
-
https://packt.link/INq4w.Conventions
-
http://packtpub.com
-
http://www.packtpub.com/submit-errata,
-
https://packt.link/free-ebook/97818046136722.
-
https://www.packtpub.com/product/cybersecurity-threats-malware-trends-and-strategies/9781800206014.
-
http://Microsoft.com
-
https://www.microsoft.com/security/blog/2021/01/27/microsoft-surpasses-10-billion-in
-
https://docs.microsoft.com/en-us/security/cybersecumrity-reference-architecture/mcra.
-
https://www2.deloitte.com/us/en/insights/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.html.
-
https://nvd.nist.gov/vuln.
-
https://www.cisecurity.org/cis-benchmarks/.
-
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf.
-
https://techcommunity.microsoft.com/t5/azure-active-directoryidentity/your-pa-word-doesn-t-matter/ba-p/73198.
-
https://www.microsoft.com/securityinsights/Phishing.
-
https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/.
-
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi.Join
-
https://attack.mitre.org
-
http://organization.is
-
https://www.bbc.com/news/av/business-22348290.
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf.
-
https://attack.mitre.org/.
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf.
-
https://www.first.org/tlp/.
-
https://www.cisa.gov/tlp.
-
https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html.
-
https://docs.oasis-open.org/cti/stix/v2.1/stix-v2.1.html.
-
https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html.
-
https://docs.oasisopen.org/cti/taxii/v2.1/taxii-v2.1.html.
-
https://cve.mitre.org/cve/search_cve_list.html.The
-
https://www.first.org/cvss/.To
-
https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf.Zero-day
-
https://www.cve.org
-
https://www.cvedetails.com
-
https://www.cve.org/PartnerInformation/ListofPartners.
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog,
-
https://ubuntu.com/security/cves.
-
https://wiki.ubuntu.com/Releases.
-
http://easier.management
-
https://www.cvedetails.com/product/19997/GoogleAndroid.html?vendor_id=12
-
https://www.cvedetails.com/product/47/Linux-LinuxKernel.html?vendor_id=3
-
https://www.cvedetails.com/product-list/product_type-/
-
https://www.cvedetails.com/product/34965/
-
https://www.cvedetails.com/product/32367/Microsoft-Edge.html?vendor_id=2
-
https://www.cvedetails.com/product/3264/MozillaFirefox.html?vendor_id=45
-
https://blogs.windows.com/windowsexperience/2020/01/15/new-year-new-browser-the-new-microsoft-edge
-
http://accurately.report
-
https://www.microsoft.com/en-us/wdsi/threats.
-
http://Alja-zeera.com
-
https://www.computerworld.com/article/3199373/windows-by-the-numbers-windows-10-continuesto-cannibaliz
-
https://krebsonsecurity.com/2017/08/carbon-emissionsoversharing-bug-puts-security-vendor-back-in
-
https://www.theregister.co.uk/2004/01/07/microsoft_releases_blaster_cleanup_tool
-
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/directacces
-
http://Wikipedia.com
-
https://www.microsoft.com/security/blog/2016/04/22/ransomware-understanding-the-risk/Join
-
http://google.om
-
http://google.com
-
http://apple.om
-
http://apple.com
-
http://abuse.ch
-
https://transparencyreport.google.com/safe-browsing/overview?unsafe=data
-
https://support.microsoft.com/en-us/windows/help-protect-my-pc-with-microsoft-defender-offline-9306d528-64bf
-
https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why.
-
https://www.itworldcanada.com/article/searchable-database-of-1-4-billion-stolen-credentials-found-
-
http://221.om
-
https://venturebeat.com/security/ukraine-weve-repelled-nonstop-ddos-attacks-from-russia/Join
-
http://USASpending.gov
-
https://www.ietf.org/about/mission/.But
-
http://systems.property
-
https://www.transportation.gov/briefing-room/usdot-announces-additional-measures-hel
-
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurit
-
https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/fact-sheet-president-signs-executive-orde
-
https://www.brookings.edu/blog/brookings-now/2014/05/22/unit-61398-indictment-exposes-real-fac
-
https://www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-reportThese
-
https://transparencyreport.google.com/about.For
-
https://transparencyreport.google.com/user-data/us-national-security.
-
https://www.microsoft.com/en-us/corporate-responsibility/us-national-security-orders-report.
-
http://data.in
-
https://ec.europa.eu/info/law/law-topic/data-protection/international-di
-
https://www.youtube.com/watch?v=78qFK-r7WBI.-dency
-
https://www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-re
-
https://uk.reuters.com/article/us-usa-encryption-facebook/u-s-senators-threaten-facebook-apple-with-encryption-regulation
-
http://Peterswire.net
-
http://Obamawhitehouse.archives.gov
-
https://blogs.microsoft.com/on-the-issues/2017/10/23/doj-acts-curb-overuse-secrecy-orders-now-congress-turn
-
http://Justice.gov
-
https://www.justice.gov/ag/page/file/1207496/download#Agreement%20between%20the%20Government%20of%20the%20United%20States%20of%20America%20and%20the%20Government%20of%20the%20United%20Kingdom%20of%20Great%20Britain%20and%20Northern%20Ireland%20on%
-
http://www.microsoft.com/sir.Join
-
http://av-test.org
-
http://av-comparatives.org
-
http://data.systems
-
https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zon
-
https://storage.googleapis.com/pub-tools-public-publication-data/pdf/432
-
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-o
-
https://www.computerweekly.com/news/450301845/One-in-five-businesses-hit-by-ransomware-are-forced-to-cl
-
https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-securi
-
https://assets.publishing.service.gov.uk/government/uploads/system/uploa
-
https://www.virusbulletin.com
-
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-direc
-
http://systems.one
-
http://Matrix.is
-
https://attack.mitre.org/tactics/TA0001/Attack
-
https://attack.mitre.org/tactics/TA0002/Attack
-
https://attack.mitre.org/tactics/TA0003/The
-
https://attack.mitre.org/tactics/TA0004/.
-
https://attack.mitre.org/tactics/TA0011/Attack
-
https://attack.mitre.org/tactics/TA0007/.Attack
-
https://attack.mitre.org/tactics/TA0010/.The
-
https://attack.mitre.org/tactics/TA0040/.numerous
-
https://attack.mitre.org/tactics/enterprise/.The
-
https://attack.mitre.org/techniques/enterprise/.The
-
https://attack.mitre.org/mitigations/enterprise/.ConclusionThat
-
https://docs.microsoft.com/en-us/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of
-
http://past.so
-
http://work.is
-
https://attack.mitre.org/resources/adversary-emulation-plans/.
-
https://order-of-the-engineer.org
-
https://azure.microsoft.com/explore/global-infrastructure/Although
-
https://ec2.amazonaws.com/?Action=RunInstances&ImageId=
-
https://docs.aws.amazon.com/cli/latest/userguide/security.html.Of
-
https://management.azure.com/subscriptions/{subscription-id}/resourceGroups/myResourceGroup/providers/Microsoft.Compute/virtualMachines/{vm-name}?api-version=2022-08-01{
-
http://windows.net/{existing-container-name}/{existing-generalized-os-image-blob-name}.
-
http://windows.net/{existing-container-name}/myDisk.vhd
-
http://ec2.amazonaws.com
-
http://debt.it
-
https://www.microsoft.com/en-us/trust-center/compliance/compliance-overviewcan
-
https://aws.amazon.com/blogs/security/whitepaper-available-classic-intrusion-analysis-frame
-
https://aws.amazon.com/blogs/publicsector/goldilocks-zone-disaster-recovery-business-continuity-plann
-
https://aws.amazon.com/blogs/architecture/disaster-recovery-dr-architecture-on-aws-part-iv-multi-site-active-active/This
-
https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vmsCombining
-
https://www.ansible.com
-
https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.
-
https://www.terraform.io
-
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/CloudComputing/ComplianceControlsCatalogue
-
https://aws.amazon.com/blogs/publicsector/goldilocks-zone-disaster-recovery-business
- Show all
-