Repeat after me: Installation after Exploitation Time-traveling back to our previous blog post, we explored a stage deep into the attack lifecycle called Exploitation. Following the delivery of malicious code, successful exploitation opens up an opportunity. Namely, a foot in the door to your network for the unauthorized installation of [...]
About Teckla HolmesThis author has not yet filled in any details.
So far Teckla Holmes has created 7 blog entries.
The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]
Special Delivery! Following our first and second posts, actions in the delivery phase move from the shadows into the light. The step where knowledgeable organizations first realize the intended weapons posed by threat actors. Harry and Marv from Home Alone are no longer conducting reconnaissance by driving around city [...]
In our previous post, we discussed the first stage of almost all Cyber Attacks: Reconnaissance. Gathering information related to an intended victim is the initial action taken during a campaign against a target. It also sets the tone for the following phases of attack. Next up: Weaponization. I recall [...]
Our previous series dug just below the surface of a hot topic you've heard about, even if you were living under a rock for the past four years… Unless attackers encrypted your smart TV, too. Perhaps you're a victim of Cyber Reconnaissance? This new series covers a framework that [...]
Remember the speed-dating craze? Do you recall how it was not only ideal for encouraging fast connections, but also rapid-fire information exchange? Or how it was terrible for preventing viruses and sickness from spreading to everyone? Well, guess what? Your flat network, without any boundaries, behaves in the exact [...]
The previous topic in this series discussed an important and often overlooked technique of preventing cyber criminals from successfully soliciting money from you or your business via ransomware - Creating and testing backups of critical data and systems. Knowing how to react and more importantly, being prepared for a [...]