Cyber Security Montreal Secure Server Encrypted Data

Home » Blog » How shape-shifting threat actors complicate attack attribution

The already difficult task of attributing a cybersecurity attack to a particular threat actor is made harder by the shape-shifting nature of threat groups. Despite the best efforts of researchers, some attackers may never be identified.

At last week's VB2021 conference, cybersecurity analysts and researchers walked through the breadcrumbs they followed to identify the malicious actors behind the Colonial Pipeline, Sony Pictures, and Iran railway system attacks. These examples show why attribution is complicated and sometimes impossible.

To read this article in full, please click here

Let's start your project

Let's create together your web solutions and build the best
user experience. Let's reach new levels with a new website,
the best onsite seo strategy and make the best conversion rate
on your ecommerce solution.
Alain Picard IT - Secure Server Montreal WordPress Magento
crossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram