Skip to content
  • About CTA
    • Who We Are
    • Board of Directors
    • Testimonials
    • Our Sharing Model
  • Membership
  • Partnerships
  • News & Events
  • Resources
  • Blog
  • Careers
  • Contact
  • About CTA

    • About CTA
    • Who We Are
    • Board of Directors
    • Testimonials
    • Our Sharing Model
  • Membership
  • Partnerships
  • News & Events
  • Resources
  • Blog
  • Careers
  • Contact

Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat

Home » Blog » Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat
By Cyber Threat Alliance
February 22, 2018
cryptowall-reportDownload

Author: Cyber Threat Alliance

Related

CTA in Focus (December 2022)

By Cyber Threat Alliance

This is the excerpt

Cyber Incident Reporting Framework

By Cyber Threat Alliance

Multiple industry organizations have come together to provide input regarding cyber incident reporting. This group has identified a set of principles that the incident reporting regulation should incorporate, and we have developed a set of model reporting formats the Cybersecurity and Infrastructure Security Agency (CISA) could use as the foundation for the reporting forms.

CTA Value Proposition

By Cyber Threat Alliance

  • About CTA
    • Who We Are
    • Board of Directors
    • Testimonials
    • Our Sharing Model
  • Membership
  • Careers
  • News & Events
  • Partnerships
  • Resources
  • Contact

Copyright ©2023 Cyber Threat Alliance