Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation when sourcing information online.
Flashpoint combines robust data collection with intelligence methodologies to collect and sift through large volumes of data, helping the world’s mission-critical organizations filter out the noise and make informed decisions during times of turmoil.
In this session, Flashpoint covered:
-
Four possible waves of cyberattacks and cyberterrorism
-
Fact or fiction: Examples of legitimate attacks vs. deceptive tactics
-
Discernment strategies and lessons learned