Eurico Santosesantoscyber.hashnode.dev·Dec 22, 2024Exploring the Cyber Kill ChainThe Cyber Kill Chain, developed by Lockheed Martin, describes the stages an attacker follows to compromise a system or network. Understanding these phases is crucial for identifying, preventing, and mitigating cybersecurity threats. Today, I explored...Cyber kill chain
J3bitokjebitok.hashnode.dev·Nov 10, 2024Cyber Defense Frameworks: Cyber Kill Chain (TryHackMe)In this article, I will write a Cyber Kill Chain write-up: The Basics that covers Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C&C), Action on Objectives (Exfiltration), and Practice Analysis. What is the n...cyber-defense
Harshal Shahdelvingwithharshal.hashnode.dev·Jul 12, 2024Cyber Kill Chain Basics: Recognizing Hacker Tactics and Keeping SafeIn the ever-evolving world of cybersecurity, understanding how attackers operate is critical to building effective defenses. The cyber kill chain is a powerful framework that breaks down a cyberattack into distinct stages, allowing security professio...Fortify and Defend: Navigating the Cybersecurity Landscape#cybersecurity
Stackzerostackzero.hashnode.dev·Jul 24, 2023Cyber Kill Chain: How Hackers Target and Take Down OrganizationsThis article is an introduction to what is Cyber Kill Chain and how it works. Maybe if you follow some cybersecurity podcast, newsletter etc. you have heard about that, but did you know exactly what is it? Knowing what it is is mandatory for anyone w...142 reads#cybersecurity
Farhan Ashrafblog.farhanashraf.dev·Dec 19, 2022Threat Actors and the Attack SurfaceThreat actors are individuals or groups that attempt to compromise a computer system or organization for their own benefit. These actors may be motivated by financial gain, political ideology, or a desire to cause disruption. In order to execute an a...38 readsThreat actors