1. Bank of England(2016).CBEST Intelligence‐Led Testing Understanding Cyber Threat Intelligence Operations Version 2.0.https://www.bankofengland.co.uk/‐/media/boe/files/financial‐stability/financial‐sector‐continuity/understanding‐cyber‐threat‐intelligence‐operations.pdf(accessed 13 January 2023).
2. Bank of England(2022).CBEST Threat Intelligence‐Led Assessments. Implementation Guide.https://www.bankofengland.co.uk/‐/media/boe/files/financial‐stability/financial‐sector‐continuity/cbest‐implementation‐guide.pdf(accessed 13 January 2023).
3. Biasini N.(2016).SamSam: the doctor will see you after he pays the ransom.Cisco Talos Threat Intelligence(23 March).https://blog.talosintelligence.com/2016/03/samsam‐ransomware.html(accessed 13 January 2023).
4. Carnegie Mellon University(2016).CRR implementation guide. Volume 5 incident management.https://us‐cert.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide‐IM.pdf(accessed 13 January 2023).
5. Cordero T.(2016).Bangko Sentral slaps P1‐B fine on RCBC for stolen Bangladesh Bank fund.GMA News Authority(5 August).https://www.gmanetwork.com/news/money/companies/576498/bangko‐sentral‐slaps‐p1‐b‐fine‐on‐rcbc‐for‐stolen‐bangladesh‐bank‐fund/story(accessed 13 January 2023).