Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Deconstructing The Cyber Kill Chain
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
lightcyber
0%
100%
lightcyber,
User Rank: Strategist
11/18/2014 | 6:06:06 PM
Re: Good breakdown of the Kill Chain - how prevalent is it?
The term Cyber Kill Chain is suprisingly very prevalent in the industry. I think that almost every security vendor that I can think about used it at least once. I can say for sure that in some cases people don't use it correctly, as they are less familiar with the attackers' tactics and the comlexity of cyber attacks.

When Lockheed Martin was a victim of a targeted attack the whole concept of creating an exploit and using it to target a specific company was realatively new and therefore this was most of the focus in their terminology. Surprisingly people still use this same scheme.

A lot has happened since that breach and I personally know about some targeted attacks that used generic malware and exploits in order to enter a network. The focus today should be the atctive state of the breach, inside the network.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/18/2014 | 4:20:28 PM
Good breakdown of the Kill Chain - how prevalent is it?
Curious to know from our readers how many of you follow the Cyber Kill Chain model, or some version of it?

And for @Giora Engel -- how prevalent is it, industry wide?

 
<<   <   Page 2 / 2


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&amp;M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.