A hacker's path to the crown jewels
Hacker's Path To The Crown Jewels
When a malicious actor looks to conduct a hacking campaign, their activities follow a relatively predictable pattern, involving 4 major actions:
- Recon/intelligence gathering
- Initial foothold
- Lateral movement
- Action (most commonly, data exfiltration)
This e-book provides a closer look into each of these 4 major activities and provides exclusive insight into how an organization can better detect the early warning signs of a hack and stop them before they strike.