This case study provides insight into the process, technology, and step-by-step activities used to attribute, unmask, and confirm the identity of an adversary that was stealing and publishing trade secrets on social media. Find out how intelligence experts conducted their investigation and arrived at the results over a period of a mere three hours.
3 Hours to Attribution the Unmasking of an adversary leaking trade secrets on social media
previous post