DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Shamoon
Shamoon
Attacking from Inside
The Middle East Under Malware Attack Dissecting Cyber Weapons
A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
Fractional Dynamics of Stuxnet Virus Propagation in Industrial Control Systems
FROM SHAMOON to STONEDRILL Wipers Attacking Saudi Organizations and Beyond
Lawrence A. Husick, Esq. Co-Chair, FPRI Center on Terrorism May 1, 2015 We Were Warned…
Attributing Cyber Attacks Thomas Rida & Ben Buchanana a Department of War Studies, King’S College London, UK Published Online: 23 Dec 2014
A History of Cyber Incidents and Threats Involving Industrial Control Systems Kevin Hemsley, Ronald Fisher
Sony's Nightmare Before Christmas: the 2014 North Korean Cyber
Tofino-Security-Blog-Re-Shamoon
Istrinternet Security Threat Report Volume
Understanding the Twitter User Networks of Viruses and Ransomware Attacks
The Strategic Promise of Offensive Cyber Operations
“Zerocleare” Targets Energy Sector in the Middle East
Cybersecurity & Geopolitics
Anti-War and the Cyber Triangle Strategic Implications of Cyber Operations and Cyber Security for the State
A Report on Attackers in the Energy Industry CONTENTS
Spyware, Stealer, Locker, Wiper: Lockergoga Revisited
Top View
Guide to Industrial Control Systems (ICS) Security
Two Decades of SCADA Exploitation: a Brief History
Cyber Threat Landscape Report, 2019-2020
Mcafee Strategic Intelligence/Shamoon 2 Frequently Asked Questions
Shamoon and the Evolution of Cyber Conflict
A Plain English Primer on Cybersecurity for Critical Infrastructure by Sinan Pismisoglu Smart Cities & Connected Communities | Spring/Summer 2020
Operation Blockbuster: Unraveling the Long Thread of the Sony Attack 3 Caveats
How Wiper Malware Affects Middle East and South America
2020-Crowdstrike-Global-Threat-Report
A Historical Timeline
Mcafee Threats Report: Third Quarter 2012
Destructive Malware?’ 2
Spreading Techniques and Deception-Based Detection
Table of Contents
Did You Know?
The Rise of Destructive Malware Modern Bombs Used in Cyberattack
Advanced Malware and Nuclear Power: Past, Present, and Future
Cylance Ai Endpoint Platform Solutions
Foreign Policy Responses to International Cyber-Attacks
Understanding and Countering Coercion in Cyberspace
2016 State of Endpoint Risk Final 2
CERIAS Tech Report 2013-9 Crude Faux: an Analysis of Cyber Conflict Within the Oil & Gas Industries by Kambic, K., Aurthor, K
The Inevitable IT Breach
Is the GCC Cyber Resilient? March 2020 International Security Programme
Cyber Warfare Conflict Analysis and Case Studies Mohan B
Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework
Winning and Losing in Cyberspace
Cyber Attack on Saudi Aramco Sahar Alshathry King Saud University ABSTRACT Saudi Aramco Is the Largest Oil Production Company in the Entire World
Stuxnet CSS CYBER DEFENSE PROJECT
Threat Group Cards: a Threat Actor Encyclopedia
The Security Awareness and Security Practices in Prevention of Ransomware Attacks: Case Study of Shaqra University
Energy at Risk.Pdf
The Most Terrifying Incidents Hackers and Organized Groups Diabolic Malware Spookiest Vulnerabilities
Attacks Against Critical Infrastructure (White Paper)
Cybersecurity and Stability in the Gulf Summary by James Andrew Lewis1 the Gulf Has Become a Flashpoint
2020 Global Threat Report Crowdstrike Global Threat Report 2020 2
Cyber-Weapons: Legal and Strategic Aspects
Principles of Cyber Deterrence and the Challenges in Developing a Credible Cyber Deterrence Posture
Recovering from a Destructive Cyber-Attack
Introduction to Cyber-Warfare: a Multidisciplinary Approach
Malware Evolution. the Top Security Stories of 2013 ��������������������������������������������4 >>1