The curious case of the Raspberry Pi in the network closet, how we found, analyzed (with the help of Reddit) and in the end caught the culprit of a malicious device in our network
Archive: January 2019
2019
18
Jan
4
Jan
NOTE: This document incomplete, still DRAFT Mode… The intelligence, in terms of security, is a collection of security-related information which when analysed provides meaningful foresight. The threat intelligence likewise is an analysis of information collected about the cyber threat so[…]
End
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|