Industry Report

Black Hat

How Attackers Confuse Investigators with Cyber False Flag Attacks

  • Get examples of false flag attacks that try to misdirect investigators
  • Learn how they fit into the cyber kill chain
  • See how network detection and response can identify these attacks