|
Post by account_disabled on Feb 17, 2024 1:24:25 GMT -5
Fight Back. Attribution and Retribution Are the Weapons of This Fightback. That Might Mean Building Beacons Into Documents So That When Attackers Open Them, They Call Home to Alert Defenders That Their Information Has Been Compromised, Baker and Muth Suggest. This Could Mean Using the Information Provided by Beacons to Compromise an Attacker's Network and Collect Evidence About the Attacker's Identity. This Could Mean Stopping Attacks by Taking Over the Botnet or Patching Vulnerabilities That Allow the Botnet to Of Course, You Need More Lawyers. We Need to Leverage Private Poland Telemarketing Data Resources to Carry Out Retaliation and Attribution Not by Supporting Cyberattacks, but by Encouraging Retaliation. Within the Bounds of the Law, the Authors Continued. Fortunately, Once the Cause of the Attack is Determined, Legal Remedies Start to Become Very Realistic. In Short, You No Longer Have to Sit Still, Baker and Muth Conclude. There Are Many Risks in Trying to Move Beyond Passive Cyber Defenses, but There May Be Even Greater Risks in a Doubling-down.
|
|