April 2022
Intermediate to advanced
241 pages
8h 22m
English
In films, spies use fake identities and intricate heists to steal sensitive information. Today, government spies can conduct cyberattacks from the safety of their homes. Similarly, organized crime gangs and cartels leverage cyber capabilities as a means to compromise their targets, steal millions from them, and launder money to support other operations.
In Part I of this book, we discuss some of the most infamous real-world cyberattacks by nation-states and criminals. For each attack, we’ll discuss its timeline, the likely motivation behind it, its technical details, and the lessons we can learn from it as analysts. Reviewing the events that took place before, during, and after the attacks allows ...
Read now
Unlock full access