{
"id":"052c60151a7309d5e121e29b08df5372f0fe156e78d309fd2dabede6ea1de795",
"pubkey":"f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797",
"created_at":1710355866,
"kind":1,
"tags": [],
"content":"How to Identify a Cyber Adversary: What to Look For\n\nThere are many factors involved in attributing a cyber incident to a specific threat actor.\n\nhttps://www.darkreading.com/cyberattacks-data-breaches/how-to-identify-a-cyber-adversary-what-to-look-for",
"sig":"cc92709f1c2995515c3bdac7b08e569dfa541ebdde24746ab72167792de4299bded4b47e68c6620c9fe1be2e2e9052bcdb7eec9168a42eb9779f2adec1a1a3d9"
}