Quantcast
Channel: Cisco Talos Blog
Viewing all articles
Browse latest Browse all 1950

Attribution: A Puzzle

$
0
0
By Martin Lee, Paul Rascagneres and Vitor Ventura.  Introduction The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available to researchers reach a level of proof that would be acceptable in a court of law. Nevertheless, the private sector rises to the challenge to attempt to associate cyber attacks to threat actors using the intelligence available to them. This intelligence takes...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Viewing all articles
Browse latest Browse all 1950

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>