The Threat of Digital Steganography-cloaked Malware to U.S. Critical Infrastructure Systems

Past Examples

So how do we protect against this threat?

But what about cyber attribution?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store