June 2022
Beginner
460 pages
11h 5m
English
When people think of threat actors, they often associate the iconography of the hooded miscreant; hiding out in a basement, their features illuminated by the glow of the monitor, tirelessly pecking on the keys of a worn-out keyboard. While this may be a semi-accurate portrayal for a percentage, the reality is that threat actors are far more professional and organized. Studying their behaviors and approaches to committing cybercrimes is much more detailed and involves studying the threat actors, their motivations, and the associated tactics, techniques, and procedures (TTPs) that they utilize in their attack chain.
As we learned in the previous chapter, there are many diverse methods we can use ...
Read now
Unlock full access