Follow

From lone wolves to teams of hackers, developers to analysts, the profile of attackers is highly diversified.

Here is a short summary of the different skills needed to carry offensive (cyber) operations: kerkour.com/profiles-cyberatta

Sign in to participate in the conversation
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!