Ejercicios
- DPRK-aligned threat actor targeting cryptocurrency vertical with global hacking campaign
- IndigoDrop spreads via military-themed lures to deliver Cobalt Strike
- PROMETHIUM extends global reach with StrongPity3 APT
- Transparent Tribe: Evolution analysis, part 1
- Transparent Tribe: Evolution analysis, part 2
- MITRE ATT&CK
- ATT&CK Navigator
- SecureList
- FireEye
- Cisco Talos Intelligence
- Clearsky Security
- We Live Security
- Your Bias Is
- Your Logical Fallacy
- El Orden Mundial
- CIA Library
- THAI CERT - Threat Actor Encyclopedia
- SANS
- Awesome Threat Intelligence
- Talos - Attribution Puzzle
-
Intelligence: From Secrets to Policy - Mark Lowenthal
-
Structured Analytic Techniques for Intelligence Analysis - Richards Heuer
-
Psychology of Intelligence Analysis - Richards Heuer
-
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage - Timo Steffens
-
Así se domina el mundo - Pedro Baños
-
El dominio mundial - Pedro Baños
-
The cuckoo's egg - Clifford Stoll (Novela)
-
Permanent Record - Edward Snowden