An analysis of threat techniques used by Silence Group, Goblin Panda and Zegost, which can help construct effective defenses.
Source: Threadpost