FOLLOW THE MONEY: DISSECTING THE OPERATIONS OF THE CYBER CRIME GROUP FIN6
Description: Reports on payment card intrusions and theft are often fragmentary.
The focus is on various pieces of the attack and less about capturing
the end-to-end cycle of compromise, data theft, illicit sale and use.
The full scope of attacker activity traditionally occurs beyond the
view of any one group of investigators. Incident response teams may
have visibility into the technical aspects of the breach itself, while
cyber crime researchers monitor the movement and sale of stolen
data in the criminal underground.
With ITBusinessBook, you can turn ideas into possibilities and use information to empower your business. Check out the most recent research studies and whitepapers right now!