Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] Equifax data breach: https://www.ftc.gov/enforcement/refunds/equifax-data-breach-settlement
- [2] Attack on Colonial Pipeline: https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years
- [3] AutoRecon GitHub: https://github.com/Tib3rius/AutoRecon
- [4] Zero-day: https://en.wikipedia.org/wiki/Zero-day_(computing)
- [5] Private zero-day: https://www.bitdefender.com/blog/hotforsecurity/1-million-private-zero-day-bounty-reward-for-ios-9/
- [6] Darknet Diaries: https://darknetdiaries.com/episode/132/
- [7] Operation Aurora on Google: https://www.youtube.com/watch?v=przDcQe6n5o
- [8] Untold story of NotPetya: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
- [9] Stuxnet explained: https://www.csoonline.com/article/562691/stuxnet-explained-the-first...