attacks Archive
Software supply chain attacks

How to Prevent Software Supply-Chain Attacks

The recent warning posted by US National Counterintelligence and Security Center (NCSC) for software supply-chain attack risk draws attention to software used by companies in their supply chain. Every 3 out of 4 professionals acknowledge that they are not fully prepared for supply-chain attacks (aka third-party attacks or value-chain attacks) in responses given to a […]
supply chain hacker attacks

Are You Ready for Hackers Incoming Supply-Chain Attacks?

Are you ready for hackers’ incoming supply-chain attacks? A recent report released by 401TRG (the Threat Research & Analysis Team at ProtectWise) reveals that Chinese hackers, who have abundant experience on APTs, are now getting prepared for software supply-chain attacks. Are your ready? What is software supply-chain attack? Hackers usually insert a backdoor to a […]
memcached ddos attack

Are your assets at risk of being victimized or weaponized in a Memcached DDoS attack?

Two record-breaking DDoS attacks, which used misconfigured Memcached servers for amplification/reflection, created 1.35 Tbps and 1.7 Tbps bogus traffic towards GitHub and an unnamed US-based company, respectively. Even though amplification/reflection DDoS attacks are not new to the cyber security world, the amount of traffic created is terrifyingly huge thanks to misconfigured Memcached servers’ amplification by […]
Keynotes Phishing

Keynotes APWG Global Phishing Survey 2015-2016 – Attack Motivation

Keynotes, Phishing; Attacks where money is handled or moves in commerce are typically designed to directly defraud victims. Attacks on social networks, e-mail systems usually are attempts to harvest credentials for further use. There are continued attacks on ISP’s and other Internet services companies to obtain Internet resources to launch further attacks. There are also […]