Right, exactly. And yes, that’s the metric, and this is the structure of threat information expression. And the good thing about these frameworks is that they’re designed to counter the threat actors that are already assumed to be AI in some way, right? Because as a black hat, you would plant those stealth agents and when you want to complete the kill chain, you will not manually type those commands, you’ll press enter and your botnet does the work for you.

Keyboard shortcuts

j previous speech k next speech