Back

Risks of Public Cyber Attribution Discussed at RSAC 2026

Severity: Medium (Score: 43.0)

Sources: Cybersecuritydive, Darkreading

Summary

At the RSAC 2026 Conference, experts highlighted the complexities and risks associated with publicly attributing cyberattacks to specific threat actors. The panel emphasized that attribution is often probabilistic rather than definitive, with Brett Callow noting that naming a hacking group can lead to diplomatic retaliation or other consequences. Mike Egan pointed out that companies may mistakenly believe that attributing attacks to nation-states absolves them of responsibility, potentially increasing customer anxiety. Megan Stifel stressed the importance of strategic objectives in attribution decisions, as public statements can significantly impact a company's narrative and regulatory obligations. The discussion revealed that the rush to attribute can lead to unintended blowback and complicate the narrative surrounding cyber incidents. Key Points: • Public attribution of cyberattacks can lead to diplomatic and reputational risks. • Attribution is often probabilistic, not definitive, complicating public statements. • Companies must consider strategic objectives before publicly blaming threat actors.

Key Entities

  • Salt Typhoon (apt_group)
  • Sandworm (apt_group)
  • Data Breach (attack_type)
  • Ransomware (attack_type)
  • North Korea (country)
  • Ukraine (country)
  • NotPetya (malware)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed