Category: Security

  • Communication Satellites

    In late February 2022, just hours before Russia began its invasion of Ukraine, Russia had carried out a cyberattack that disrupted satellite communications in Ukraine; as determined by U.S. and European officials. The attack targeted ViaSat’s KA-SAT system, which provides high-speed satellite communications to Ukraine, and resulted in thousands of Ukrainians being disconnected from the …


    December 27, 2022

  • SolarWinds Compromise

    The SolarWinds compromise was a major cyber attack that occurred in 2020 and targeted various government and private organizations around the world. The attack has been attributed to Russia and is believed to have been carried out by APT29, a Russia-based espionage group that is sponsored by the Russian Foreign Intelligence Service (SVR). The attackers used a supply chain attack to compromise the …


    December 26, 2022

  • APT 29

    APT 29, also known as Cozy Bear or The Dukes, is a highly sophisticated cyber espionage group believed to be sponsored by the Russian government. The group has been active since at least 2008 and has been linked to a number of high-profile cyber attacks, including the breach of the Democratic National Committee (DNC) in 2016 and the Solarwinds compromise in December 2020. APT 29 is known for its …


    December 24, 2022

  • Lateral Movement

    Lateral movement is a technique used by attackers to move within a network, laterally, to gain access to additional resources and systems. This can be done to escalate privileges, access sensitive data, or to maintain a foothold within the network for future attacks. There are several ways that attackers can perform lateral movement, including: Using compromised user credentials: If an attacker is …


    December 24, 2022

  • Metasploit

    https://www.youtube.com/watch?v=TCPyoWHy4eA Metasploit is a framework for developing, testing, and executing exploits against a target system. It is commonly used by security professionals and researchers to perform penetration testing and vulnerability assessments, as well as by attackers to execute real-world attacks. The Metasploit framework includes a collection of exploits, payloads, and …


    December 24, 2022