August 08, 2023 Enough attribution to count Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way Threat Research
August 08, 2023 Clustering attacker behavior reveals hidden patterns A series of ransomware attacks made by different groups share curiously similar characteristics Threat Research