When cybercriminals intent to attack an organization for a number of purposes, i.e. to exfiltrate data, or lock the systems, they follow a series of phases that constitute an attack lifecycle. For cybercriminals to execute a successful attack, they must advance through each stage. Blocking them at any point in this cycle will destroy the chain of attack; hence, prevention must occur at each stage to hinder the criminals to infiltrate into the organization. In this white paper, the different stages of the lifecycle of email-based attacks described and remediations that should be applied to prevent an attack at any stage are elaborated.
- March 9, 2020