From lone wolves to teams of hackers, developers to analysts, the profile of attackers is highly diversified.

Here is a short summary of the different skills needed to carry offensive (cyber) operations:

Sign in to participate in the conversation

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!