Dec. 14, 2022, 1 p.m. | Robert Lemos, Contributing Writer, Dark Reading

Dark Reading www.darkreading.com

Aiming to give threat hunters a list of popular attack tactics, a cybersecurity team analyzed collections of real-world threat data to find attackers' most popular techniques.

analysis attackers obfuscation powershell

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066