1.Incident background As the source of cyberspace attack activities, the cyber threat actors have different purposes and motivations, and their capabilities also have significant hierarchical differences. According to the motivation of the operation, the attack capability, and the control o……
