Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes.
... NotPetya used the EternalBlue exploit, similar to WannaCry, to propagate 346 Ransomware and Modern Threats Case studies of notorious ransomware and modern threats Case study one: WannaCry ransomware attack Case study two: NotPetya ...
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas.
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum ...
... ransomware . Case Study : NotPetya . We find it remarkable that USHALLNOTPASS was effective against NotPetya , a particular debilitating ransomware that in 2017 was used for a global cyberattack against Ukraine , Germany , Russia ...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting.
This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware.
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved.