About Teckla Holmes

This author has not yet filled in any details.
So far Teckla Holmes has created 7 blog entries.
6:27 pm 6:27 pm

Cyber Kill Chain V: Installation


Repeat after me: Installation after Exploitation Time-traveling back to our previous blog post, we explored a stage deep into the attack lifecycle called Exploitation. Following the delivery of malicious code, successful exploitation opens up an opportunity. Namely, a foot in the door to your network for the unauthorized installation of [...]

Cyber Kill Chain V: Installation2018-05-01T17:26:31-06:00
5:12 pm 5:12 pm

Cyber Kill Chain IV: Exploitation


The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]

Cyber Kill Chain IV: Exploitation2018-01-03T17:12:16-06:00
2:17 pm 2:17 pm

Cyber Kill Chain III: Delivery


Special Delivery! Following our first and second posts, actions in the delivery phase move from the shadows into the light. The step where knowledgeable organizations first realize the intended weapons posed by threat actors. Harry and Marv from Home Alone are no longer conducting reconnaissance by driving around city [...]

Cyber Kill Chain III: Delivery2017-11-24T14:17:06-06:00
12:30 pm 12:30 pm

Cyber Kill Chain II: Weaponization


In our previous post, we discussed the first stage of almost all Cyber Attacks: Reconnaissance. Gathering information related to an intended victim is the initial action taken during a campaign against a target. It also sets the tone for the following phases of attack. Next up: Weaponization. I recall [...]

Cyber Kill Chain II: Weaponization2017-11-24T14:21:31-06:00
11:14 am 11:14 am

Cyber Kill Chain 1: Reconnaissance


Our previous series dug just below the surface of a hot topic you've heard about, even if you were living under a rock for the past four years… Unless attackers encrypted your smart TV, too. Perhaps you're a victim of Cyber Reconnaissance? This new series covers a framework that [...]

Cyber Kill Chain 1: Reconnaissance2017-08-25T14:14:02-06:00
4:10 pm 4:10 pm

Ransomware 301: Know your Network Boundaries


Remember the speed-dating craze?  Do you recall how it was not only ideal for encouraging fast connections, but also rapid-fire information exchange? Or how it was terrible for preventing viruses and sickness from spreading to everyone? Well, guess what? Your flat network, without any boundaries, behaves in the exact [...]

Ransomware 301: Know your Network Boundaries2017-11-24T14:34:03-06:00
6:32 pm 6:32 pm

Ransomware 101. Know what Bait looks like


 The previous topic in this series discussed an important and often overlooked technique of preventing cyber criminals from successfully soliciting money from you or your business via ransomware - Creating and testing backups of critical data and systems. Knowing how to react and more importantly, being prepared for a [...]

Ransomware 101. Know what Bait looks like2017-11-24T14:45:51-06:00