Get a Pentest and security assessment of your IT network.

News

Deconstructing The Cyber Kill Chain

The term Cyber Kill Chain has been widely used by the security community to describe the different stages of cyber attacks. It’s a compelling model, easy to understand and, lets face it, the name sounds really cool. But the actual scope of cyberthreats extends far beyond that of the Cyber Kill chain. The Chain is disproportionate on an attack time scale: Steps 1 through 6 take relatively little time, whereas step 7 can take months. Intrusion based on remote access, in which no malware or payload is involved, is far, longer than those covered by the Chain. We’re not afraid to say it can actually be detrimental to security.”]

Source: https://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones