A cyberattacker notices a security flaw in a software that a company is using. They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software. To which category of the Cyber Kill Chain model does this event belong?
fisher004
Highly Voted 1 year, 7 months agoc79ecd3
Most Recent 1 year agoBen789456
1 year, 5 months agoBen789456
1 year, 5 months agoRoBery
1 year, 5 months agodnn_cbops
1 year, 5 months agosheyshey
1 year, 7 months agosheyshey
1 year, 7 months ago