These are the sources and citations used to research 8-1 Discussion Network Threats. This bibliography was generated on Cite This For Me on
In-text: (What You Need to Know about BlackByte Ransomware as a Service | ExtraHop, 2022)
Your Bibliography: Extrahop.com. 2022. What You Need to Know about BlackByte Ransomware as a Service | ExtraHop. [online] Available at: <https://www.extrahop.com/company/blog/2022/what-you-need-to-know-about-blackbyte-ransomware-as-a-service/> [Accessed 24 February 2022].
In-text: (Fuchs, 2022)
Your Bibliography: Fuchs, J., 2022. Hackers Attach Malicious .exe Files to Teams Conversations. [online] Avanan.com. Available at: <https://www.avanan.com/blog/hackers-attach-malicious-.exe-files-to-teams-conversations> [Accessed 24 February 2022].
In-text: (Best patch management tools of 2022, 2022)
Your Bibliography: TechRadar. 2022. Best patch management tools of 2022. [online] Available at: <https://www.techradar.com/best/best-patch-management-tools> [Accessed 24 February 2022].
In-text: (Microsoft Teams Targeted With Takeover Trojans, 2022)
Your Bibliography: Threatpost.com. 2022. Microsoft Teams Targeted With Takeover Trojans. [online] Available at: <https://threatpost.com/microsoft-teams-targeted-takeover-trojans/178497/> [Accessed 22 February 2022].
10,587 students joined last month!