← @kwm Twitter archive



As we study named threat actors, keep in mind that how they work is every bit as important as the tools that they use.

Study their timing, and the information that they use for targeting.

Most important of all: Understand what they *want*. Tools change. Objectives endure.

3/9/2018, 9:00:01 PM

Favs: 106

Retweets: 38