Cyber attack campaigns for the coming decade
As noted in the previous examples, it is altogether difficult, if not nearly impossible, to categorize cyber attacks with broad strokes. In the past three decades, however, cyber attacks from nation states and APT-related groups were at least somewhat bound by the necessity of finding a vulnerability, crafting an exploit, and conducting the operation; that is, they were bound by the paradigms associated with legacy cyber attacks. But in the coming decade, those restrictions aren't nearly as limiting, as cyber attacks from these entities move outside the bounds of the need for that life cycle to be complete. In the digitally-connected and technology-enabled world we find ourselves in, there is no longer a requirement for an attacker to follow that chain of events. The proliferation of technology, combined with the explosion of social media and leaks of extremely advanced exploitation techniques and tools, helps threat actors operate...