A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?
Leslee
3 days agoMarti
4 days agoColetta
5 days agoDiego
6 days ago