These are the sources and citations used to research Notorious APTs. This bibliography was generated on Cite This For Me on
In-text: (2018)
Your Bibliography: Crysys.hu. 2018. [online] Available at: <http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf> [Accessed 28 May 2018].
In-text: (Red October (malware), 2018)
Your Bibliography: En.wikipedia.org. 2018. Red October (malware). [online] Available at: <https://en.wikipedia.org/wiki/Red_October_(malware)> [Accessed 28 May 2018].
In-text: (Fruhlinger, 2018)
Your Bibliography: Fruhlinger, J., 2018. What is Stuxnet, who created it and how does it work?. [online] CSO Online. Available at: <https://www.csoonline.com/article/3218104/malware/what-is-stuxnet-who-created-it-and-how-does-it-work.html> [Accessed 28 May 2018].
In-text: (The Most Famous Advanced Persistent Threats in History, 2018)
Your Bibliography: Itbusinessedge.com. 2018. The Most Famous Advanced Persistent Threats in History. [online] Available at: <https://www.itbusinessedge.com/slideshows/the-most-famous-advanced-persistent-threats-in-history-13.html> [Accessed 28 May 2018].
In-text: (2018)
Your Bibliography: Rsaconference.com. 2018. [online] Available at: <https://www.rsaconference.com/writable/presentations/file_upload/br-208_bencsath.pdf> [Accessed 28 May 2018].
In-text: (What is Duqu (W32.Duqu)? - Definition from WhatIs.com, 2018)
Your Bibliography: SearchSecurity. 2018. What is Duqu (W32.Duqu)? - Definition from WhatIs.com. [online] Available at: <https://searchsecurity.techtarget.com/definition/Duqu> [Accessed 28 May 2018].
In-text: (“Red October” Diplomatic Cyber Attacks Investigation, 2018)
Your Bibliography: Securelist - Kaspersky Lab’s cyberthreat research and reports. 2018. “Red October” Diplomatic Cyber Attacks Investigation. [online] Available at: <https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740/> [Accessed 28 May 2018].
10,587 students joined last month!