01 // Briefing
You learned the five types. Now profile one.
In yesterday's session you learned the five threat actor categories — nation-state, organised cybercrime, hacktivist, insider, opportunist. Categories are a starting point. The real work is going deeper into specific groups: who they are, what they target, and how they operate.
This is what threat intelligence analysts do most days. Before you can defend against an attacker, you have to understand the attacker. You are going to spend the next two days building a profile of one real, named threat group — using public, open sources.
Two groups to pick from. Each profile will be 1 page, structured the same way, and will feed directly into Lab Task 02 (where you'll take the CVEs you find here into the terminal).
// Objectives
attack.mitre.org properly — yesterday you saw it for 60 seconds, today you live in it.