from Fortinet Blog | Latest Posts
In my last blog post, we walked through, at a high level, who the various threat actors are, and looked at a blended attack chain to get an idea of how “bad guys” are stealing data or causing disruption. (http://ift.tt/1TwfXwr) As a quick reminder, we also discussed the seven phases of the attack chain: reconnaissance, weaponization, delivery, exploit, command and control, internal reconnaissance, and maintaining. In this blog I’ll focus on how...