Gov Info Security
The human behind the hack: Identifying individual hackers
Engineering and Technology
“While it may be tough to associate the methodology and tooling to an individual, it's possible to track by grouping to an entity," says Vectra CSO Günter Ollmann. "The way malware variables are set, allocated and flushed in the code, as well as the language compiler, all provide hints to the education and experience of the developer.”