Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2023

CyberLink Breached Through Supply Chain Attack By North Korean Hackers

Recently, the Microsoft Threat Intelligence Team has discovered a supply chain attack executed by North Korean attackers. The prime victim of this attack was CyberLink, a multimedia software company headquartered in Taiwan. This strategic infiltration in the CyberLink infrastructure impacted globally present customers, risking data integrity and confidentiality.

Hacktivists attack U.S. water treatment plant - analysis and implications

Almost a year ago to the day, on December 1 2022, Forescout Vedere Labs published a report detailing several hacktivist operations that targeted critical infrastructure in response to the Russian invasion of Ukraine and other geopolitical developments. Since the most recent chapter in the Hamas-Israel conflict started on October 7, there have been multiple similar claims of attacks from hacktivists taking opposing sides in the conflict.

Can a passenger hack an airplane? Ethical hacker Ken Munro has the answer

Hollywood would have us believe that an airplane can be hacked by a tech-savvy passenger. But can they really? Ethical hacker Ken Munro decided to dig into airplane security and answer some common movie questions, like ‘what can a hacker do from seat 23A?’

Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

Imagine walking down the street, innocently scrolling through your phone, completely unaware that someone nearby is attempting to hijack your Bluetooth connection. It sounds like a scene straight out of a spy movie, right? Well, this kind of covert hacking, known as bluejacking and bluesnarfing, is a growing concern in today’s digital age.

From Shadow to Guardian: The Journey of a Hacker-Turned Hero

In the ever-evolving landscape of cybersecurity, the line between the defenders and attackers often blurs, with skills transferable across both arenas. It’s a narrative not unfamiliar to many in the cybersecurity community: the journey from black hat to white hat, from outlaw to protector. In the 15th episode of Cato Networks’ Cyber Security Master Class, hosted by Etay Maor, Senior Director of Security Strategy, we had the privilege of witnessing such a transformative story unfold.

Hackers Get Hacked Back!

Have you ever wondered how hackers get hacked back? Today we detail the story of how this is possible! Did you learn something from this video? Make sure to comment it below! For more information about SecurityScorecard, you can find us here: SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.