Cyber Kill Chain IV: Exploitation

2018-01-03T17:12:16-06:00

The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]