2022-05-20 21:20:24 -04:00
|
|
|
%%INTRODUCTION
|
|
|
|
|
|
|
|
|
|
@report{ransomware_paloalto,
|
|
|
|
|
institution = {Palo Alto Networks},
|
|
|
|
|
title = {Ransomware Threat Report 2022},
|
|
|
|
|
url = {https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/2022-unit42-ransomware-threat-report-final.pdf}
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
@report{ransomware_pwc,
|
|
|
|
|
institution = {PricewaterhouseCoopers},
|
|
|
|
|
title = {Cyber Threats 2021: A year in Retrospect},
|
|
|
|
|
url = {https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf}
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
@report{rootkit_ptsecurity,
|
|
|
|
|
institution = {Positive Technologies},
|
|
|
|
|
title = {Rootkits: evolution and detection methods},
|
|
|
|
|
date = {2021-11-03},
|
|
|
|
|
url = {https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/}
|
|
|
|
|
}
|
|
|
|
|
|