Information technology is vulnerable and the Internet is international. Politicians, spies and hackers use malware to steal votes and influence foreign elections. This research correlates two years of malware detected in countries holding national elections. It encompasses thousands of malware families and dozens of elections, using timelines, geolocation and interviews with country-level CERTs.
1: Learn how to incorporate strategic traffic analysis into malware research and detection.
2: Understand why you should correlate major geopolitical events (including elections) with your log files.
3: Resolve to find and defeat nation-state actors on your network.
Malware, network security, national security, elections, critical infrastructure, international relations.
Hackers & Threats
security intelligence anti-malware hackers & threats cyber warfare & cyber weapons critical infrastructure
Share With Your Community