April 2022
Intermediate to advanced
241 pages
8h 22m
English
Are there third-party names that exist for the group you are profiling?
What type of attacks has the threat group conducted?
What type of malware does the group use? Is it publicly available or custom-developed malware?
What is the timeline of the activity?
What vulnerabilities does the attacker exploit? (CVEs?)
Read now
Unlock full access