Industry Report
Black Hat
How Attackers Confuse Investigators with Cyber False Flag Attacks
- Get examples of false flag attacks that try to misdirect investigators
- Learn how they fit into the cyber kill chain
- See how network detection and response can identify these attacks