![Hacking Humans - Intrusion Kill Chain (noun) [Word Notes]](https://storage.googleapis.com/goodpods-images-bucket/episode_images/309bde6807513035772eef04e9ba84e486dd71a00c559ae55e01b8f7cb753731.avif)
Intrusion Kill Chain (noun) [Word Notes]
06/21/22 • 7 min
1 Listener
A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Previous Episode

The great resignation and data exposure challenges.
Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for.
Links to stories:
- Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert
- Phishing tactics: how a threat actor stole 1M credentials in 4 months
Have a Catch of the Day you'd like to share? Email it to us at [email protected] or hit us up on Twitte
Next Episode

North Korea and a global cyber war.
Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some listener follow up from listener John, regarding a T-mobile breach and how he was notified through a third-party monitoring service and not T-Mobile. Joe's story shares how hackers are also keeping an eye on the upcoming holidays and describes how a Father's Day beer contest from Heineken was a scam. Dave's story is on police warning against a rise in voice phishing as they have made 2000 arrests since the crackdown on social engineering and business email scams started. Our catch of the day comes all the way from the Netherlands, listener Joram shares a scam he discovered in his spam folder. The sender notified him that she is frail and will be dying soon, to which her millions of dollars will be lost since she has no next of kin. The sender goes on to tell him that he is receiving this money just out of the goodness of her heart.
Links to stories:
- Heineken says Father's Day beer contest is a scam
- 2,000 arrests in crackdown on social engineering and business email scams
Have a Catch of the Day you'd like to share? Email it to us at [email protected] or hit us up on Twitter
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/hacking-humans-182670/intrusion-kill-chain-noun-word-notes-21552417"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to intrusion kill chain (noun) [word notes] on goodpods" style="width: 225px" /> </a>
Copy