June 30, 2023, 1:08 p.m. | Simon Hendery

SC Magazine feed for Strategy www.scmagazine.com

Researchers studying an APT and its use of a previously unknown malware sample unmasked the identity of the cyber criminals behind the attacks thanks to tactical mistakes made by the adversary.

adversary apt attacks bug criminals cyber cyber criminals earlyrat exploited identity log4j malware novel researchers sample tactical threat intelligence threats unmasked

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC