DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.
This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
Read the original article: