kill-chain
Data Exfiltration Prevention: A How-To Guide
The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing it without authorization. Targeted data can include customer lists, source code, patent ...
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering ...
Active Reconnaissance: Overview, Methodology and Tools
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,… The post Active Reconnaissance: Overview, Methodology and ...
The Kill Chain Model Works When Analysts See the Full Picture
Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery ...
Detecting Bad Actors Early in the Kill Chain
Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps ...