Pen & Keyboard: The CTI's Handbook
search
⌘Ctrlk
Pen & Keyboard: The CTI's Handbook
  • ~# welcome !
  • CTI | Cyber Threat Intellignce
    • Introduction to CTI
    • CTI Fundamentals
    • Data Collection and Sources
    • Threat Actors and Profiles
    • Indicators of Compromise (IOCs)
    • Threat Intelligence Platforms (TIPs)
    • Analysis and Threat Assessment
    • Incident Response and Mitigation
    • Case Studies
      • Case #01 - Water Dybbuk Group
      • Case #02 - Indian Spammers Exploit Thousands with Fake Norton Antivirus Refund Scam via Google Forms
    • CTI Sharing and Collaboration
    • Tools and Resources
    • Emerging Threats
    • Best Practices and Tips
    • Challenges and Ethical Considerations
    • Projects
    • Resources
  • Cyber Warfare
    • Edward Snowden: Spies and the Law - BBC Documentary 2015
  • Learning-Assembly
    • Assembly + C - Part # 1
    • Assemby + C - Part # 2
    • Assemby + C - Part # 3+4
    • Assembly + C - Part #5
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CTI | Cyber Threat Intellignce

Case Studies

Case #01 - Water Dybbuk Groupchevron-rightCase #02 - Indian Spammers Exploit Thousands with Fake Norton Antivirus Refund Scam via Google Formschevron-right
PreviousIncident Response and Mitigationchevron-leftNextCase #01 - Water Dybbuk Groupchevron-right