Table of Contents - The History of Human-Operated Ransomware Attacks
- The Life Cycle of a Human-Operated Ransomware Attack
- The Incident Response Process
- Cyber Threat Intelligence and Ransomware
- Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures
- Collecting Ransomware-Related Cyber Threat Intelligence
- Digital Forensic Artifacts and Their Main Sources
- Investigating Initial Access Techniques
- Investigating Post-Exploitation Techniques
- Investigating Data Exfiltration Techniques
- Investigating Ransomware Deployment Techniques
- The Unified Ransomware Kill Chain