J3bitokjebitok.hashnode.dev·Nov 10, 2024Cyber Defense Frameworks: Cyber Kill Chain (TryHackMe)In this article, I will write a Cyber Kill Chain write-up: The Basics that covers Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C&C), Action on Objectives (Exfiltration), and Practice Analysis. What is the n...Discusscyber-defense
Harshal Shahdelvingwithharshal.hashnode.dev·Jul 12, 2024Cyber Kill Chain Basics: Recognizing Hacker Tactics and Keeping SafeIn the ever-evolving world of cybersecurity, understanding how attackers operate is critical to building effective defenses. The cyber kill chain is a powerful framework that breaks down a cyberattack into distinct stages, allowing security professio...DiscussFortify and Defend: Navigating the Cybersecurity Landscape#cybersecurity
Stackzerostackzero.hashnode.dev·Jul 24, 2023Cyber Kill Chain: How Hackers Target and Take Down OrganizationsThis article is an introduction to what is Cyber Kill Chain and how it works. Maybe if you follow some cybersecurity podcast, newsletter etc. you have heard about that, but did you know exactly what is it? Knowing what it is is mandatory for anyone w...Discuss·139 reads#cybersecurity
Farhan Ashrafblog.farhanashraf.dev·Dec 19, 2022Threat Actors and the Attack SurfaceThreat actors are individuals or groups that attempt to compromise a computer system or organization for their own benefit. These actors may be motivated by financial gain, political ideology, or a desire to cause disruption. In order to execute an a...Discuss·38 readsThreat actors