Killing the Kill Chain: Disrupting the Cyber Attack Progression
Star 0
Share
Abstract
Exploits for high impact vulnerabilities are often made available minutes after being announced. A point of ingress is identified, malware spreads, privileges are escalated, and exfiltration of high…