Star 0

Abstract

In this session we will explain how our Threat Intel experts recognized the traits of a highly sophisticated, targeted attack against the banks network and how ultimately there were only 2 bytes between the thieves and their loot. We will also present details of the incident management process and technical measures taken.