How Threat Analysts Learned from Attackers' OpSec MistakesHow Threat Analysts Learned from Attackers' OpSec Mistakes
In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.

In their investigation of state-sponsored threat group ITG18, or "Charming Kitten," IBM X-Force researchers found attackers' operational security errors revealed intimate details about their entire operation. Here, they discuss what they learned and how their findings can aid enterprise security teams.
Read more about:
Black Hat NewsAbout the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025