Laith Alkhouri @MENAanalyst
Agreed. If they build *proprietary* tools; if they penetrate govt DBs; if they are state-sponsored; if they build 0day - in these scenarios, they’re sophisticated. But they are still the minority. The massive pool of attackers largely consists of those after low hanging fruits. — PolitiTweet.org
Runa Sandvik @runasand
It's a fancy word used to give us all the impression that there was nothing the company could or should have done d… https://t.co/hFJOmWBoUs