1. Data exfiltration: A review of external attack vectors and countermeasures
2. ScottWilson SusanMaphis HelgaGeorge RebeccaTurley StevenCarver andHannahCoffman.Top 5 Most Technically Advanced Hacking Attacks of All Time.https://www.cybersecurityeducationguides.org/2017/11/top‐5‐most‐technically‐advanced‐hacking‐attacks‐of‐all‐time/ 2017.
3. Verizon.2020 Data Breach Investigations Report.https://enterprise.verizon.com/resources/reports/2020‐data‐breach‐investigations‐report.pdf 2020.
4. KevinSavage PeterCoogan andHonLau.The evolution of ransomware. Technical report Symantec Corp. Mountain View CA USA.https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the‐evolution‐of‐ransomware.pdf 2015.
5. National Cyber Security Centre.Russian state‐sponsored cyber actors targeting network infrastructure devices.https://www.ncsc.gov.uk/pdfs/blog‐post/malicious‐russian‐cyber‐activity‐what‐does‐it‐mean‐small‐organisations.pdf 2018.