https://arxiv.org/pdf https://cams.mit.edu/wp-content/uploads/2021-04-30-USA-Today-Hackers-use-similar-looking-characters1.pdf https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf https://empower.tylertech.com/rs/015-NUU-525/images/2023-12-14-TylerCybersecurity-DailyBriefing.pdf https://lawjournal.ku.edu/wp-content/uploads/2021/10/4_Fey_V30_I3.pdf https://link.springer.com/content/pdf/10.1007/978-1-4842-6655-7_7.pdf https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-106/jfq-106_83-84_Lafortune.pdf https://nsarchive.gwu.edu/sites/default/files/documents/4333120/Black-Hat-Hacking-in-a-Foreign-Language-A.pdf https://phys.org/news/2016-09-russian-hackers.pdf https://stratcomcoe.org/cuploads/pfiles/Nato-Cyber-Report_11-06-2021-4f4ce.pdf https://stratcomcoe.org/cuploads/pfiles/cyber_attacks_estonia.pdf https://stratcomcoe.org/publications/download/Sino-Russian-Information-Operations-DIGITAL.pdf https://techxplore.com/news/2024-01-hp-enterprise-discloses-hack-state.pdf https://www.amphilsoc.org/sites/default/files/2020-03/attachments/Jamieson.pdf https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20111231_art013.pdf https://www.boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf https://www.cfcs.dk/globalassets/cfcs/dokumenter/trusselsvurderinger/en/the-cyber-threat-against-denmark-in-light-of-russia-invasion-of-ukraine.pdf https://www.cisa.gov/sites/default/files/2024-05/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity-508c.pdf https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf https://www.consilium.europa.eu/en/press/press-releases/2024/06/24/cyber-attacks-six-persons-added-to-eu-sanctions-list-for-malicious-cyber-activitiescyberattacks-against-eu-member-states-and-ukraine/pdf https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf https://www.cyber.gc.ca/sites/default/files/cyber-threat-activity-associated-russian-invasion-ukraine-e.pdf https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf https://www.dni.gov/files/documents/ICA_2017_01.pdf https://www.fbi.gov/wanted/cyber/gru-hackers-destructive-malware-and-international-cyber-attacks/collage-8-5x11-web2-1.pdf https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections/election-interference-collage-8-5x11.pdf https://www.fec.gov/files/legal/murs/7207/7207_47.pdf https://www.guycarp.com/content/dam/guycarp-rebrand/insights-images/2024/02/2024_2_Casino_Incident_Analysis_publish.pdf https://www.hhs.gov/sites/default/files/black-basta-threat-profile.pdf https://www.hhs.gov/sites/default/files/killnet-analyst-note-tlpclear.pdf https://www.hhs.gov/sites/default/files/killnet-analyst-note.pdf https://www.iss.europa.eu/sites/default/files/EUISSFiles/CP_148.pdf https://www.judiciary.senate.gov/imo/media/doc/2023-12-05_-_testimony_-_wray.pdf https://www.mandiant.com/sites/default/files/2021-09/APT28-Center-of-Storm-2017.pdf https://www.rand.org/content/dam/rand/pubs/research_reports/RR4300/RR4373z2/RAND_RR4373z2.pdf https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT473/RAND_CT473.pdf https://www.sans.org/cyberskills/Kolstad-Report-2017.pdf https://www.sec.gov/comments/s7-10-20/s71020-8157718-226862.pdf https://www.wyden.senate.gov/imo/media/doc/wyden_letter_to_cisa_doj_ftc_re_2023_microsoft_breach.pdf