Further reading
Following are the references we used in this chapter along with some bonus resources you can check out:
- https://blog.virustotal.com/2023/07/virustotal-malware-trends-report.html
- https://stonefly.com/blog/how-is-ransomware-delivered/
- https://inquest.net/blog/top-malware-delivery-tactics-watch-out-2023/
- https://cyberpedia.reasonlabs.com/EN/payload%20delivery.html
- https://heimdalsecurity.com/blog/cyber-kill-chain-model/
- https://www.todyl.com/blog/cyberattack-lifecycle-delivery
- https://kravensecurity.com/cyber-kill-chain/