Produced with the support of CPNI and based on real-life scenarios, these papers aim to help organisations understand how cyber attacks are conducted
Whilst all attacks will be tailored to the organisation being targeted, there will be similarities in how they’re orchestrated. We believe that understanding common attack methodologies is key to better protecting the network.
This is why, with the support of CPNI, we have selected and issued these case studies in order to help illustrate the reality of the modern cyber threat - and the subsequent need for investment in security measures. Based on real-life incidents handled by our cyber defence and incident response teams, the reports cover a wide range of the typical attack types from a number of threat actors, including nation state and cyber criminals.
Each case study provides the key information from the incident, including attacker methodologies, suspected threat actors, assets compromised, business impacts and the full timeline of the attack; covering targeting, compromise, exfiltration, discovery and containment.
This content is open for comments - please email email@example.com