Cyber Kill Chain IV: Exploitation


The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]