Results for "attribution"

Attribution

Attribution is the practice of taking forensic artifacts of a cyberattack and matching them to known threats against targets with a profile matching a particular organization. For an in-depth look, see our two-part blog series on when you should care about attribution and why one shouldn’t overthink it.

CONTINUE READING No Comments

November 29, 2016 - In Part II of this three-part series, we take a deeper look into the mistakes one easily makes in terms of cyber attack attribution.

CONTINUE READING No Comments

October 26, 2016 - Attribution is the practice of taking forensic artifacts of a cyber attack and matching them to known threats against targets with a profile matching your organization. If this seems overly complicated, that is intentional. There are degrees of attribution that map to very specific contexts and painting over that context with a simplistic reading accomplishes very little other than frightening decision makers into unnecessary expenditures.

CONTINUE READING No Comments

October 4, 2021 - Neiman Marcus has suffered a big data breach. What should you do if you are one of the affected customers?

CONTINUE READING No Comments

August 17, 2021 - "We have the smoke, the smell of gunpowder and a bullet casing. But we do not have the gun to link the activity to the Kremlin."

CONTINUE READING No Comments

July 20, 2021 - The US, UK, EU, and NATO have have issued a coordinated, public censure of China for its role in attacks against Exchange servers earlier this year.

CONTINUE READING No Comments

April 21, 2021 - Pulse Secure is alerting users about the active exploitation of old and new vulnerabilities, in what may be state-sponsored attacks.

CONTINUE READING No Comments

April 20, 2021 - Fedir Hladyr is considered the mastermind behind the Carbanak campaign that stole $900 million from financial institutions and others.

CONTINUE READING No Comments

April 19, 2021 - The North Korean APT uses a clever technique to bypass security products by embedding one of its payload as a BMP image.

CONTINUE READING No Comments

April 16, 2021 - US intelligence and law enforcement agencies have issued a joint advisory listing 5 specific vulnerabilities being used by the SVR against the US and its allies.

CONTINUE READING No Comments

Select your language