CIS Control 1: Inventory and Control of Hardware Assets
CIS Control 20: Penetration Tests and Red Team Exercises
CIS Control 17: Implement a Security Awareness and Training Program
CIS Control 19: Incident Response and Management
CIS Control 18: Application Software Security
Advanced Network Technology
Tailored Access Operations / Computer Network Operations
What is the name given to the NSA hacking group by outside malware companies?
The Equation Group
Jake Williams, Rendition InfoSec
MalwareJake
Sell the information to the highest bidder
Joe Biden
Donald Trump
He was a former member of TAO / The Equation Group
SANS Institute
Eternal Blue
Update Windows, an update came out that fixed the vulnerability a month earlier.
Russia
He may have played a part in TAO’s targeting of China. He could have been arrested.
An exploit that takes advantages of a vulnerability that is not yet known by security professionals. They have had “zero days” to prepare for the exploit.
Gathering personal information on his target
“Leave them feeling better having met you.”
Crying “sick” child
Personal assistant