After every major data breach, the security community engages in a game of whodunit. It's human nature to want some sort of closure and to see the perpetrators brought to justice, but it's time to discuss the truth about attributing a source cyber attacks: it's not as straightforward as one would think. '
Recent research proves that threat actors use a variety of techniques to 'create misattribution of the attacks. In our upcoming webinar, Cybereason's Ross Rustici, Sr. Manager Threat Intel, and SANS will discuss examples of attack misattribution and figure out if correct attribution is still possible.
Join us to learn: