A hacker's path to the crown jewels

Hacker's Path To The Crown Jewels

Cover

When a malicious actor looks to conduct a hacking campaign, their activities follow a relatively predictable pattern, involving 4 major actions:

  1. Recon/intelligence gathering
  2. Initial foothold
  3. Lateral movement
  4. Action (most commonly, data exfiltration)

This e-book provides a closer look into each of these 4 major activities and provides exclusive insight into how an organization can better detect the early warning signs of a hack and stop them before they strike.

Vendor:
Cymulate
Posted:
Sep 15, 2021
Published:
Feb 8, 2021
Format:
PDF
Type:
eBook
Already a Bitpipe member? Log in here

Download this eBook!