The Cyber Security Whodunnit: Challenges in Attribution of Targeted Attacks

Our focus continues to be on researching the methods, tools, and techniques used by targeted attackers