Staying up to date and informed on threat-actor group behavior is one way both organizations and individuals can best navigate the continually changing security landscape.

Dark Reading, Staff & Contributors

March 28, 2024

1 Min Read
hacker in the dark on a laptop
ANTHONY SPRATT VIA ALAMY STOCK

Hacking is a phenomenon that has been around since at least the 1960s, initially as an exploration into computing more broadly, fueled by the insatiable curiosity of an eternally brilliant community of "hackers," and in large part, that remains true today. Unfortunately, the term "hacking" can conjure up scenes of a lonely individual in a hoodie behind a keyboard, bullying and stealing from victims with ease from the safety of a poorly lit basement room. Although this trope is an exaggeration, there are those within the hacking community who have joined forces to use their powers for evil, forming digital cartels of all sorts, with their own codes of conduct.

Recently, we've observed a shift in attitudes around unwritten rules that have dictated behavior within certain criminal cyber rings in regard to attacking both individuals and organizations. What once rang true as an agreed-upon code of ethics that threat actors lived by is now being renegotiated. 

Read the Full Article on Dark Reading

About the Author(s)

Dark Reading

Staff & Contributors

Dark Reading: Connecting The Information Security Community

Long one of the most widely-read cybersecurity news sites on the Web, Dark Reading is also the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights