By Martin Lee, Paul Rascagneres and Vitor Ventura.
Introduction
The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available to researchers reach a level of proof that would be acceptable in a court of law.
Nevertheless, the private sector rises to the challenge to attempt to associate cyber attacks to threat actors using the intelligence available to them. This intelligence takes...
[[ This is only the beginning! Please visit the blog for the complete entry ]]
[[ This is only the beginning! Please visit the blog for the complete entry ]]