Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Nov 24, 2014
Discovering threat groups using open source intelligence gathering and honeypots, collecting and analyzing their artifacts to figure out who they are and what their capabilities were, then analyzing and reverse engineering the communications between infected nodes to build our own client that allows you to track their targets in real time.