Today, companies find themselves targeted by sophisticated nation state cyber attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players, the techniques they use, and the process of analysing their advanced attacks. Whether you're an individual researcher or part of a team within a Security Operations Center (SoC), you'll learn to approach, track, and attribute attacks to these advanced actors. Jon DiMaggio demonstrates some of the techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among others.
"synopsis" may belong to another edition of this title.
Jon DiMaggio is a seasoned cybersecurity expert specializing in hunting, researching, and writing about advanced cyber threats. His career began in the intelligence community as a Signals Intelligence (SIGINT) analyst supporting government agencies. He has developed extensive expertise in enterprise ransomware attacks and nation-state intrusions, particularly through conducting human intelligence (HUMINT) operations to infiltrate ransomware gangs. In 2024 his research series The Ransomware Diaries delivered crucial insights that helped law enforcement disrupt the LockBit Ransomware operation.
Jon is a two-time recipient of the SANS Difference Makers Award (2022, 2023), and his research has appeared in leading media outlets including the New York Times, Wired, Bloomberg, Fox, CNN, and Reuters. In 2024, he appeared on CBS's 60 Minutes to discuss his experiences infiltrating ransomware operations. He frequently presents at major cybersecurity conferences including RSA and DEFCON.
"About this title" may belong to another edition of this title.
£ 4.42 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 1718502141-11-1
Quantity: 1 available
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: As New. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 1718502141-10-1
Quantity: 1 available
Seller: Bellwetherbooks, McKeesport, PA, U.S.A.
paperback. Condition: As New. LIKE NEW/UNREAD!!! Text is Clean and Unmarked! Has a small black line or red dot on the bottom/exterior edge of pages. Seller Inventory # NS-PB-LN-1718502141
Quantity: 6 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 46407546-6
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 43164999-n
Quantity: 3 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 610. Seller Inventory # B9781718502147
Quantity: 6 available
Seller: Speedyhen, London, United Kingdom
Condition: NEW. Seller Inventory # NW9781718502147
Quantity: 3 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 43164999
Quantity: 3 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # EB-9781718502147
Quantity: 5 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states.A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states.Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you're an individual researcher or part of a team within a Security Operations Center (SoC), you'll learn to approach, track, and attribute attacks to these advanced actors.The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers' techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of-North Korea's series of cyber attacks against financial institutions, which resulted in billions of dollars stolenThe world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomwareRecent cyber attacks aimed at disrupting or influencing national elections globallyThe book's second part walks through how defenders can track and attribute future attacks. You'll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts. "This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"-- Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9781718502147
Quantity: 1 available