1

Profiling Cyber Adversaries and Their Tactics

Cyber threats have become a critical component of our digital world. From state-sponsored hackers to rogue individuals, corporate spies, and organized crime units, these threat actors come in many forms and possess the skills and capacities to wreak havoc on our online infrastructure. Motivated by various objectives, such as financial gain or espionage, threat actors employ a complex array of Tactics, Techniques, and Procedures (TTPs) for their attacks. These tactics may include anything from phishing campaigns, malicious software, social engineering, and network intrusions to data manipulation or theft.

In this chapter, we will discuss the motivations and objectives of threat actors and explore ...

Get Cybersecurity Strategies and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.