In this blog post, we explore the Cozy Bear Group, an established threat actor with recent exploits that impacted a popular remote access software. We explore the tactics and techniques used in this attack, the most common attack vectors used by the threat group, and provide an aligned list of Labs that can help your teams stay resilient. There will also be bear puns. Please enjoy!
Updated 3 months ago
Version 3.0