Lapsus$: Who, What, Where, Why, How

Photo by Towfiqu barbhuiya on Unsplash

Who?

What?

Where?

When?

Why?

How?

Additional Resources

--

--

--

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

On COVID-19 Themed Malware

360° Security & Privacy for a Nationwide Healthcare & Telemedicine Platform

Knownsec Blockchain Lab|In-depth understanding of reentry attack vulnerabilities

How Synchronized Token Pattern Works?

FREE $AEROX for everyone!

HYVE Technical Audit done by CyberUnit and Certik

Never Give Up — Story of Hacking Dutch Government and Earning that Swag.

Should I buy mobile phone insurance? A Quantitative Risk Analysis

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

More from Medium

APT & Threat Actor Lists

Goldilocks CTI: Building a Program That’s Just Right

The Weekly Threat 4–19–2022

Next-Gen Honeypot - DejaVU Deception System