THE ULTIMATE THREAT ACTOR LANDSCAPE

HIGHLIGHTS AND KEY FINDINGS FROM THE CYBER THREAT ACTOR HANDBOOK

Verint and Thales have recently released a comprehensive analysis (The Cyber Threat Actor Handbook) of the most prominent threat actors operating in the world today.

In this booklet, we present the key major key findings of the analysis, based

  • Highlights from the threat actors’ analysis – who is behind the attacks, what vulnerabilities are exploited, who is targeted etc.
  • Results based on thorough analysis – threat actor profiles, regional sector analysis, MITRE ATT&CK Framework based analysis
  • In-depth analysis based on different regions

The findings in the booklet are based on a thorough analysis of:

  • 490 Attack Campaigns
  • 66 Attack Groups
  • 525 Attack Tools
  • 173 MITRE Techniques
  • 98 CVEs

From time-to-time Verint (and its subsidiaries) would like to share information relating to future events, surveys about Verint, webinars, industry best practice and thought leadership with you. If you are happy for us to contact you please let us know how you would like us to contact you by confirming below:

I am happy to receive communications from Verint by email.

I am happy to be contacted by Verint by telephone.

Verint is committed to treat and protect your personal data in accordance with our Privacy Policy.