Blog

Cybersecurity Monthly: October Edition

Newsletter Series: The Cybersecurity Kill Chain Month 7: Phase 7 – Actions on Objectives This month’s letter will be a little different, and a little longer. With the number of incidents over this past summer increasing greatly affecting both multinationals as well as local businesses, I wanted ...

Cybersecurity Monthly: September Edition

Newsletter Series: The Cybersecurity Kill Chain Month 6: Phase 6 – Command-and-Control: The Attacker Takes the Wheel Once attackers have successfully installed their tools, the next step in the Cybersecurity Kill Chain is establishing Command and Control (C2) - a ...

Cybersecurity Monthly: August Edition

Newsletter Series: The Cybersecurity Kill Chain Month 5: Phase 5 – Installation: The Silent Takeover In the fifth stage of the Cybersecurity Kill Chain, the attacker has already breached the system and now seeks to establish persistence. This is the ...

Cybersecurity Monthly: July Edition

Newsletter Series: The Cybersecurity Kill Chain Month 4: Phase 4 – Exploitation: The Attack Begins After successfully delivering a malicious payload, the attacker now moves to the fourth phase of the Cybersecurity Kill Chain: **Exploitation**. This is when the attack ...

Cybersecurity Monthly: June Edition

Newsletter Series: The Cybersecurity Kill Chain Month 3: Phase 3 – Delivery: Getting the Weapon to the Target Now that the weapon has been created, the attacker needs to get it into your environment. This phase is called Delivery, and ...

Cybersecurity Monthly: May Edition

Newsletter Series: The Cybersecurity Kill Chain Month 2: Phase 2 - Weaponization: Building the Digital Weapon With information gathered during reconnaissance, the attacker now enters the Weaponization phase. This is where they craft the malicious tool that will exploit a ...

Cybersecurity Monthly: April Edition

Newsletter Series: The Cybersecurity Kill Chain Month 1: Phase 1 - Reconnaissance: The Silent Threat Before any attack begins, hackers need information. This first phase is called Reconnaissance, and it’s all about gathering intel: employee names, email addresses, network setups, ...

Cybersecurity Monthly: March Edition

Newsletter Series: The Cybersecurity Kill Chain Month 0: Understanding the Cybersecurity Kill Chain Cyberattacks don’t happen all at once. They unfold in carefully planned steps, often unnoticed until it’s too late. That’s why cybersecurity professionals use a model called the ...

Cybersecurity Monthly: February Edition

Don’t Take the Bait: How SMBs Can Outsmart Phishing Scams Phishing scams are one of the biggest cybersecurity threats facing small businesses today. These attacks often arrive as emails or text messages pretending to be from trusted sources - like ...

Cybersecurity Monthly: January Edition

Cybersecurity Resolutions for the New Year The start of a new year is the perfect time to commit to better cybersecurity practices. With cyber threats constantly evolving, even small changes can make a big difference in protecting your business. Here ...

Contact

NetCenter TechnologiesNetCenter Technologies Logo $$$

Latest Articles

Cybersecurity Monthly: October Edition

Posted by drubertus On
Cybersecurity Monthly: October Edition

Cybersecurity Monthly: September Edition

Posted by drubertus On
Cybersecurity Monthly: September Edition