Uploaded by jepako7869

CYBER

advertisement
Reference list
Abrams, L., 2021. Computer giant Acer hit by $50 million ransomware attack. [online]
www.bleepingcomputer.com. Available at:
<https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ranso
mware-attack/amp/> [Accessed 17 December 2023].
Anon. 2021. Acer Responds to Being Hit by $50M Ransomware Attack. [online] constellix.com.
Available at:
<https://constellix.com/news/acer-responds-to-being-hit-by-50m-ransomware-attack>.
Antoniuk, D., 2023. Hackers target Pakistani government, bank and telecom provider with
China-made malware. [online] therecord.media. Available at:
<https://therecord.media/hackers-target-pakistani-government-with-malware> [Accessed 17
December 2023].
Kost, E., 2021. Acer suffers $50 million ransomware attack | UpGuard. [online] Upguard.com.
Available at: <https://www.upguard.com/news/acer-ransomware-attack>.
Lightfoot, L., 2023. Security Awareness Training For Compliance. [online] Expert Insights.
Available at: <https://expertinsights.com/insights/security-awareness-training-for-compliance/>
[Accessed 17 December 2023].
Lunghi, D., 2023. Possible Supply Chain Attack Targeting Pakistani Government Delivers
Shadowpad. [online] Trend Micro. Available at:
<https://www.trendmicro.com/zh_hk/research/23/g/supply-chain-attack-targeting-pakistani-gove
rnment-delivers-shad.html> [Accessed 17 December 2023].
Newsroom, 2023. Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad
Malware. [online] The Hacker News. Available at:
<https://thehackernews.com/2023/07/pakistani-entities-targeted-in.html> [Accessed 17
December 2023].
Poireault, K., 2023. Chinese APT Favorite Backdoor Found in Pakistani Government App.
[online] Infosecurity Magazine. Available at:
<https://www.infosecurity-magazine.com/news/chinese-apt-backdoor-pakistani/> [Accessed 17
December 2023].
Roy, R., 2021. What Is a Cyber Threat? Definition, Types, Hunting, Best Practices, and
Examples. [online] Spiceworks. Available at:
<https://www.spiceworks.com/it-security/vulnerability-management/articles/what-is-cyber-threat
/>.
Download