[[1] ENISA - Threat Landscape Report 2017, 15 Top Cyber-Threats and Trends, 2018.]Search in Google Scholar
[[2] https://www.aig.com/knowledge-and-insights/k-and-i-article-state-of-cybersecurity-ukmiddle-east-africa#]Search in Google Scholar
[[3] https://hotforsecurity.bitdefender.com/blog/bitcoin-hijack-steals-from-bothransomware-authors-and-their-victims19525.html?utm_source=SMGlobal&utm_medium=Facebook&utm_campaign=H4S]Search in Google Scholar
[[4] https://www.itproportal.com/features/cyber-security-deployment-guide-to-effectivelysafeguard-systems-data/]Search in Google Scholar
[[5] https://www.rt.com/business/418790-doom-roubini-crypto-crazies-terrorists/<]Search in Google Scholar
[[6] https://securityboulevard.com/2018/01/an-infrastructure-plan-in-the-21st-century-needsto-address-cybersecurity/]Search in Google Scholar
[[7] http://securityaffairs.co/wordpress/69100/hacking/bitmessage-zero-day.html;]Search in Google Scholar
[[8] https://www.symantec.com/content/dam/symantec/docs/security-center/whitepapers/istr-ransomware-2017-en.pdf]Search in Google Scholar
[[9] https://www.symantec.com/blogs/feature-stories/2018-cyber-security-predictions]Search in Google Scholar
[[10] https://www.theregister.co.uk/2017/04/25/british_malware_author_2_years_jail_titanium_stresser/ .]Search in Google Scholar