Hacktivist groups have tightened up their level of organization and control, and today you will see them conduct military-like operations including recruitment and training, sharing tools, intelligence and allocation of targets.
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of anonymity without retaliation.
In this article, Sergey Shykevich, Threat Intelligence Group Manager at Check Point Software, looks at the rise of a new type of hacktivism and the impact of geopolitical relations on the current threat landscape.
0 Comments