Further reading
For more information on the topics covered in this chapter, you can refer to the following links:
- Threat Actor Basics: The 5 Main Threat Types: https://www.sentinelone.com/blog/threat-actor-basics-understanding-5-main-threat-types/
- Hacktivism: https://en.wikipedia.org/wiki/Hacktivism
- Hacktivism 101: A Brief History and Timeline of Notable Incidents: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/hacktivism-101-a-brief-history-of-notable-incidents
- 15-year-old script kiddie arrested in TalkTalk hacking investigation: https://siliconangle.com/2015/10/27/15-year-old-script-kiddie-arrested-in-talktalk-hacking-investigation/
- Insider Threat: https://www.imperva.com/learn/application-security/insider-threats/
- A Closer Look at the Attempted Ransomware Attack on Tesla: https://www.tripwire.com/state-of-security/featured/closer-look-attempted-ransomware-attack-tesla/
- Ransomware's cryptofootprint: https://www.kaspersky.com...