Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
How Threat Analysts Learned from Attackers' OpSec Mistakes
In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.
Dark Reading Staff
August 9, 2021
1 Min Read
In their investigation of state-sponsored threat group ITG18, or "Charming Kitten," IBM X-Force researchers found attackers' operational security errors revealed intimate details about their entire operation. Here, they discuss what they learned and how their findings can aid enterprise security teams.
Read more about:
Black Hat NewsAbout the Author(s)
You May Also Like
Your Everywhere Security guide: Four steps to stop cyberattacks
Feb 27, 2024Your Everywhere Security Guide: 4 Steps to Stop Cyberattacks
Feb 27, 2024API Security: Protecting Your Application's Attack Surface
Feb 29, 2024API Security: Protecting Your Application's Attack Surface
Feb 29, 2024Securing the Software Development Life Cycle from Start to Finish
Mar 06, 2024Editor's Choice
Laptop with ransomware, and bitcoin in the palm of a man's hand to illustrate ransomware
Cyberattacks & Data BreachesWhite Papers