This article is a guide for the installation of the Cuckoo sandbox. It is strongly oriented on the official documentation. Nevertheless, some changes have been made which i would like to share here.
This report deals with digital warfare at the example of cyber activities conducted in the Ukrainian conflict. It will highlight the impact of the malware attack NotPetya.