{
"id":"c366c866d0741a4e6784f3cdff748d982beeba89c215091f4c79ff78758bd81e",
"pubkey":"f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797",
"created_at":1710426378,
"kind":1,
"tags": [],
"content":"How to Identify a Cyber Adversary: What to Look For\n\nThere are many factors involved in attributing a cyber incident to a specific threat actor.\n\nhttps://www.darkreading.com/cyberattacks-data-breaches/how-to-identify-cyber-adversary-what-to-look-for",
"sig":"2628312603328028560d603d4e938b8c8a9be6d85e930bd1a56e76bc31e4ba21e9331c856448cc358b59b18a2734c5d578a310f975bbbab94a2bb6cacd310dec"
}