Cyber Kill Chain II: Weaponization


In our previous post, we discussed the first stage of almost all Cyber Attacks: Reconnaissance. Gathering information related to an intended victim is the initial action taken during a campaign against a target. It also sets the tone for the following phases of attack. Next up: Weaponization. I recall [...]