%%INTRODUCTION @report{ransomware_paloalto, institution = {Palo Alto Networks}, title = {Ransomware Threat Report 2022}, url = {https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/2022-unit42-ransomware-threat-report-final.pdf} }, @report{ransomware_pwc, institution = {PricewaterhouseCoopers}, title = {Cyber Threats 2021: A year in Retrospect}, url = {https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf} }, @report{rootkit_ptsecurity, institution = {Positive Technologies}, title = {Rootkits: evolution and detection methods}, date = {2021-11-03}, url = {https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/} }