The number of reported cybercrimes in Sweden is increasing every year. Cybercrimes arebecoming more sophisticated and the attackers are more skilled than before. Attackers usedifferent tactics, techniques and procedures, TTP, to establish their goals. These TTP can beidentified and later used to combat future cyberattacks. This process is known as TacticalThreat Intelligence, TTI, and is characterized by the use of open source intelligence, OSINT, to gather information about previous attacks and TTP. This paper is a literature review toprovide a background of the topic. To further investigate the topic this paper also presents theanalyzis of three different threat intelligence sharing platforms to deepen the understanding ofhow TTI is used ...
The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
The number of reported cybercrimes in Sweden is increasing every year. Cybercrimes arebecoming more ...
The number of reported cybercrimes in Sweden is increasing every year. Cybercrimes arebecoming more ...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
The majority of cyberattacks occur without the need to break into IT systems. Attackers use psycholo...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
The number of reported cybercrimes in Sweden is increasing every year. Cybercrimes arebecoming more ...
The number of reported cybercrimes in Sweden is increasing every year. Cybercrimes arebecoming more ...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
The majority of cyberattacks occur without the need to break into IT systems. Attackers use psycholo...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...