A cyberattacker notices a security flaw in a software that a company is using. They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software. To which category of the Cyber Kill Chain model does this event belong?
fisher004
Highly Voted 1 year, 5 months agoc79ecd3
Most Recent 10 months agoBen789456
1 year, 2 months agoBen789456
1 year, 3 months agoRoBery
1 year, 3 months agodnn_cbops
1 year, 3 months agosheyshey
1 year, 4 months agosheyshey
1 year, 4 months ago