Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.