$ 0 0 As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, [...]