This Market Data report lists highly visible cyber threat actors in H1 2016. This includes their status (i.e., whether they are active or not), name, region (origin), affiliation (to other cyber actors and groups), motivations (hacktivism, political, or financial), their main targets (government, business, international organizations, education, countries, industries, etc.), the tools created, if any (malware, exploit kits, ransomware, etc.), their attack/threat specialty, and the tools they use to commit offenses (breached accounts, trojans, data dumps, leaked emails, SQLi, etc.).
Table of Contents
Log in or Register to view the structure of the tables below.
Cyber Threat Agents, 1H 2016