6:27 pm 6:27 pm

Cyber Kill Chain V: Installation

2018-05-01T17:26:31-06:00

Repeat after me: Installation after Exploitation Time-traveling back to our previous blog post, we explored a stage deep into the attack lifecycle called Exploitation. Following the delivery of malicious code, successful exploitation opens up an opportunity. Namely, a foot in the door to your network for the unauthorized installation of [...]

Cyber Kill Chain V: Installation2018-05-01T17:26:31-06:00
5:12 pm 5:12 pm

Cyber Kill Chain IV: Exploitation

2018-01-03T17:12:16-06:00

The exploitation phase offers a threat actor his or her first opportunity to celebrate a victory. One of considerable size well into the active stages of a cyber attack. This celebration also represents an organization’s failure on two fronts: Failure to prevent a weaponized object from entering the environment [...]

Cyber Kill Chain IV: Exploitation2018-01-03T17:12:16-06:00
2:17 pm 2:17 pm

Cyber Kill Chain III: Delivery

2017-11-24T14:17:06-06:00

Special Delivery! Following our first and second posts, actions in the delivery phase move from the shadows into the light. The step where knowledgeable organizations first realize the intended weapons posed by threat actors. Harry and Marv from Home Alone are no longer conducting reconnaissance by driving around city [...]

Cyber Kill Chain III: Delivery2017-11-24T14:17:06-06:00
12:30 pm 12:30 pm

Cyber Kill Chain II: Weaponization

2017-11-24T14:21:31-06:00

In our previous post, we discussed the first stage of almost all Cyber Attacks: Reconnaissance. Gathering information related to an intended victim is the initial action taken during a campaign against a target. It also sets the tone for the following phases of attack. Next up: Weaponization. I recall [...]

Cyber Kill Chain II: Weaponization2017-11-24T14:21:31-06:00
11:14 am 11:14 am

Cyber Kill Chain 1: Reconnaissance

2017-08-25T14:14:02-06:00

Our previous series dug just below the surface of a hot topic you've heard about, even if you were living under a rock for the past four years… Unless attackers encrypted your smart TV, too. Perhaps you're a victim of Cyber Reconnaissance? This new series covers a framework that [...]

Cyber Kill Chain 1: Reconnaissance2017-08-25T14:14:02-06:00
4:10 pm 4:10 pm

Ransomware 301: Know your Network Boundaries

2017-11-24T14:34:03-06:00

Remember the speed-dating craze?  Do you recall how it was not only ideal for encouraging fast connections, but also rapid-fire information exchange? Or how it was terrible for preventing viruses and sickness from spreading to everyone? Well, guess what? Your flat network, without any boundaries, behaves in the exact [...]

Ransomware 301: Know your Network Boundaries2017-11-24T14:34:03-06:00
6:32 pm 6:32 pm

Ransomware 101. Know what Bait looks like

2017-11-24T14:45:51-06:00

 The previous topic in this series discussed an important and often overlooked technique of preventing cyber criminals from successfully soliciting money from you or your business via ransomware - Creating and testing backups of critical data and systems. Knowing how to react and more importantly, being prepared for a [...]

Ransomware 101. Know what Bait looks like2017-11-24T14:45:51-06:00
10:44 am 10:44 am

Ransomware 201. More than just backups.

2017-11-24T14:58:36-06:00

This series addresses the threat of ransomware that previously focused on large networks exclusively. That was 2016. It is now 2017. Small businesses and manufacturing outfits are currently in focus. Attackers are becoming more aware that the majority of small businesses and manufacturers lack the resources to set up an effective [...]

Ransomware 201. More than just backups.2017-11-24T14:58:36-06:00
Contact Us

There's no PSOL heroes around right now. But you can send us a message and we'll get back to you, ASAP.

Questions, issues or concerns? I'd love to help you!

Click ENTER to chat