IT threat evolution Q3 2020. Non-mobile statistics | Securelist
Microsoft admits to signing rootkit malware in supply-chain fiasco
Malware Analysis | Cofense Phishing Defense
Ransomware Attack | Hong Kong Police Force
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | SpringerLink
How to Register Cyber Crime Complaint With Cyber Cell of Police - Online Complaint Procedure
Magniber ransomware being spread in the guise of a legit Microsoft Edge and Google Chrome update - NotebookCheck.net News
The Incredible Rise of North Korea's Hacking Army | The New Yorker
Information | Free Full-Text | Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends | HTML
Google disrupts Russian botnet that infected 1 million Windows machines | TechCrunch
Akamai Blog | Digging Deeper – An In-Depth Analysis of a Fast Flux Network
Computer giant Acer hit by $50 million ransomware attack | TechPowerUp Forums
Information | Free Full-Text | Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends | HTML
What is Evil Corp? - Definition from WhatIs.com
Computer security - Wikipedia
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: A wolf in sheep's clothing: Actors spread malware by leveraging trust in Amnesty International and fear of Pegasus