Nation-States: They're Just Like Us. Emulating Common Tactics, Techniques, and Procedures

When attacking private organizations, nation-states often employ a variety of methodologies to gain initial access to networks, access files, exfiltrate information, and perform post-compromise tasks. These methodologies often are thought of as sophisticated, bespoke threat vectors requiring vast...
By
Geoff Horvath
June 23, 2022

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg