April 2022
Intermediate to advanced
241 pages
8h 22m
English
One of the problems plaguing nation-state attackers is all the funding and resources they lose once they’ve been outed. Attacks such as the ones we discussed in Chapter 1 often bring attention to both the victims and the governments behind them, revealing details such as the attacker’s origin, tactics, and malware. Once these are known, security vendors update their products to patch vulnerabilities and create signatures to identify the malware. Now the attacker must develop new malware and hack tools. They’ll also have to obtain new infrastructure if they want to continue operations.
After years ...
Read now
Unlock full access