6:27 pm 6:27 pm

Cyber Kill Chain V: Installation

2018-05-01T17:26:31-06:00

Repeat after me: Installation after Exploitation Time-traveling back to our previous blog post, we explored a stage deep into the attack lifecycle called Exploitation. Following the delivery of malicious code, successful exploitation opens up an opportunity. Namely, a foot in the door to your network for the unauthorized installation of [...]

Cyber Kill Chain V: Installation2018-05-01T17:26:31-06:00
5:12 pm 5:12 pm

Cyber Kill Chain IV: Exploitation

2018-01-03T17:12:16-06:00

The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]

Cyber Kill Chain IV: Exploitation2018-01-03T17:12:16-06:00
2:17 pm 2:17 pm

Cyber Kill Chain III: Delivery

2017-11-24T14:17:06-06:00

Special Delivery! Following our first and second posts, actions in the delivery phase move from the shadows into the light. The step where knowledgeable organizations first realize the intended weapons posed by threat actors. Harry and Marv from Home Alone are no longer conducting reconnaissance by driving around city [...]

Cyber Kill Chain III: Delivery2017-11-24T14:17:06-06:00
12:30 pm 12:30 pm

Cyber Kill Chain II: Weaponization

2017-11-24T14:21:31-06:00

In our previous post, we discussed the first stage of almost all Cyber Attacks: Reconnaissance. Gathering information related to an intended victim is the initial action taken during a campaign against a target. It also sets the tone for the following phases of attack. Next up: Weaponization. I recall [...]

Cyber Kill Chain II: Weaponization2017-11-24T14:21:31-06:00
11:14 am 11:14 am

Cyber Kill Chain 1: Reconnaissance

2017-08-25T14:14:02-06:00

Our previous series dug just below the surface of a hot topic you've heard about, even if you were living under a rock for the past four years… Unless attackers encrypted your smart TV, too. Perhaps you're a victim of Cyber Reconnaissance? This new series covers a framework that [...]

Cyber Kill Chain 1: Reconnaissance2017-08-25T14:14:02-06:00
Contact Us

There's no PSOL heroes around right now. But you can send us a message and we'll get back to you, ASAP.

Questions, issues or concerns? I'd love to help you!

Click ENTER to chat