April 21, 2024

Looking Back At SolarWinds Supply Chain Attack (2020)

SolarWinds is a major software company based in Tulsa, Okla. Among the company’s products is an IT performance monitoring system called Orion.  As an IT monitoring system, SolarWinds Orion has privileged access to IT systems to obtain log and system performance data. It is that privileged position and its wide deployment that made SolarWinds a lucrative and attractive target. What is the SolarWinds hack? SolarWinds...

Read More »

April 21, 2024

How Does The Attackers Get Into The Most Secure Networks?

In traditional security assessment, security professionals try to conduct penetration test, ethical hacking and so on. The security professionals think that if they can find vulnerabilities via conducting bug bounty or penetration testing, those vulnerabilities can be fixed and they are secure from cyber-attacks. But the real hacking is often quite different from penetration testing attacks, ethical hacking or this kind of staffs. In reality,...

Read More »

May 17, 2021

How to Identify Phishing Attack Properly?

E-Mail Phishing Attack Overview A social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about a company (your financial institution) or its computer systems. The attacker can look like anyone, and could fool you by saying they’re a repairman, or a new intern or employee, and they could actually have identification that says they work for your institution. They’ll...

Read More »

March 25, 2020

How to Stay Secure Against Cyber Threats While Working from Home

The spread of the novel Coronavirus (COVID-19) is forcing many organizations to require their employees to work remotely. While it might mean that we can work comfortably from our home, this also puts our cyber security at high risk as the world is now seeing a huge spike in Corona themed scams, text messages, malware attacks, phishing activities and more. New hacking campaigns are lunched...

Read More »