Targeted attack case studies

Dr David Chismon, Security Consultant
September, 2015
3 mins read

Based on real-life incidents handled by our cyber defense and incident response teams, the reports cover a wide range of the typical attack types from a number of threat actors, including nation state and cyber criminals.

Each case study provides key information from the incident, including attacker methodologies, suspected threat actors, assets compromised, business impacts and the full timeline of the attack; covering targeting, compromise, exfiltration, discovery and containment.


Case studies available for download:

  1. Application layer attack
  2. Bruteforce attack
  3. DDoS attack
  4. Network protocol attack
  5. Known vulnerability exploitation
  6. Zero-day exploitation
  7. Phishing for credentials
  8. Phishing with malware
  9. Rogue update attack
  10. Watering-hole attack
Accreditations & Certificates

F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.

Follow us
@fsecure_consult F-Secure-Consulting f-secure-foundry fsecurelabs