In ‘Machine Learning for Ransomware Detection. Cyber Kill Chain Analysis. Part 1 of 2’ we looked into the threat landscape with regards to the internet facing attack surface, Advanced Persistent Threats (APT’s), Remote Code Execution (RCE’s), and low-level threat actors. As well as the detection of ransomware across the Cyber Kill Chain, and an analysis of initial access of publicly exposed infrastructure and internal recon, including a discussion of attack and recon tools in SMB, with a look at model template flexibility.
Now, in ‘The Early Indications of a Breach. Cyber Kill Chain Analysis. Part 2 of 2’ we continue the discussion, to cover the following key points.
This Paper Includes:
Download White Paper
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Improvements are being made to arm law enforcement. But efforts are still too slow to squash the issue of ransomware, and its rise throughout 2021.
Download White Paper