Keywords
- cyber espionage
- APT
- Microsoft security breach
Introduction
Learning Objectives
- Understand the nature and impact of the Storm-0558 cyber espionage attack
- Analyze how authentication security vulnerabilities can be exploited
Download
- Includes a PDF case study adapted from a real-world cyber breach
- Guided questions for student engagement
- Instructor materials including context and background
- All content packaged in a downloadable ZIP file
Module Questions