The Cyber Kill Chain in the Age of Cloud

The Cyber Kill Chain in the Age of Cloud

The cyber kill chain is used to model a cyber intrusion, identifying the different stages involved in a cyber-attack. The model is well established, but recently I have been asked multiple times to help information security teams understand the ways in which the kill chain has changed with the advent of cloud applications.

I have summarized how I normally answer this question, in a blog post for the Netskope blog, showing some examples of malicious campaigns that have made use of the cloud to evade traditional security technologies.

No alt text provided for this image

Complete article here: https://www.netskope.com/blog/the-cyber-kill-chain-in-the-age-of-cloud.

Milos Pesic

Chief Information Security Officer @ Accelleron | MSc Information Security

5 年

Have to say Paolo Passeri?love reading articles you share and what you write,? A very elegant explanation of Cloud usage within the Kill change and how it is being exploited...? I hope you don't mind me saying, but from the LinkedIn network that I follow, I find your knowledge and experience as one of the leading individuals striving towards a more secure environment for everyone :) so please keep up the good work as it is amazing,

回复

要查看或添加评论,请登录

Paolo Passeri的更多文章

  • Three key steps to protect your business from chatbot hacking

    Three key steps to protect your business from chatbot hacking

    We’ve all experienced that moment when you’ve ordered food online from the likes of Deliveroo or Uber Eats, and when it…

  • August 2017 Cyber Attacks Statistics

    August 2017 Cyber Attacks Statistics

    And finally here we go with the statistics derived from the cyber attack timelines of August (Part I and Part II)…

  • 16-31 August 2017 Cyber Attacks Timeline

    16-31 August 2017 Cyber Attacks Timeline

    August’s gone (and the Summer with it unfortunately)… You are ready to start your usual activities after, hopefully…

  • 1-15 August 2017 Cyber Attacks Timeline

    1-15 August 2017 Cyber Attacks Timeline

    Eventually I have been able to catch up and now I am proud to publish the first timeline of August covering the main…

  • July 2017 Cyber Attacks Statistics

    July 2017 Cyber Attacks Statistics

    And finally I can publish the statistics for July derived from the corresponding timelines (part I and part II). The…

  • June 2017 Cyber Attacks Statistics

    June 2017 Cyber Attacks Statistics

    Unfortunately the end of Summer is close, however for just one moment, let’s close our eyes, go back to June and have a…

  • 16-31 July Cyber Attacks Timeline

    16-31 July Cyber Attacks Timeline

    Here we go with the second timeline of July (first part here) covering the main cyber attacks occurred between July 16…

  • 1-15 July 2017 Cyber Attacks Timeline

    1-15 July 2017 Cyber Attacks Timeline

    Et voilà, time has come to publish the first timeline of July, covering the main cyber attacks occurred during the…

  • 16-30 June 2017 Cyber Attacks Timeline

    16-30 June 2017 Cyber Attacks Timeline

    So, let's close the Infosec June 2017 with the second timeline covering the main cyber attacks occurred between June…

  • 1-15 June 2017 Cyber Attacks Timeline

    1-15 June 2017 Cyber Attacks Timeline

    Here's the first timeline of June containing the main cyber attacks occurred in the first half of the month. Complete…

    1 条评论

社区洞察

其他会员也浏览了