Data Exfiltration Prevention: A How-To Guide

The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing it without authorization. Targeted data can include customer lists, source code, patent ...
Tim Hortons Privacy Invasion, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering ...
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools

Active Reconnaissance: Overview, Methodology and Tools

Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,… The post Active Reconnaissance: Overview, Methodology and ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery ...
Security Boulevard
Protect AI Chainguard supply chain Early in the Kill Chain

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps ...
Security Boulevard