Clip
Identifying the Spread of a Cyberattack
The speaker shares their experience in identifying and investigating a cyberattack that was being carried out by a set of hackers across a variety of targets and expanding in scope every day, ultimately leading to the identification of a vulnerability.