Michael Benis

Michael Benis

Center District, Israel
9K followers 500+ connections

About

Michael Benis
✉️ Michael@benis.co.il | 📞 +972-53-6061121
As a seasoned Chief…

Articles by Michael

See all articles

Contributions

Activity

Join now to see all activity

Experience

Education

  • Bar-Ilan University Graphic
  • -

  • -

    School of High-Tech and Cyber Security at Bar-Ilan University

  • -

  • -

  • -

  • The Fortinet Network Security Expert (NSE) program is a training and certification program designed to provide interested technical professionals with an independent validation of their network security skills and experience. The NSE program includes a wide range of courses, as well as practical, experiential exercises that demonstrate mastery of complex network security concepts.

  • -

  • - Present

  • -

  • - Present

  • -

  • -

  • -

    Instructors: Nadav Nachmias | David (Dudu) Broda | Yaniv Avolov | Eli Maroodi
    Management: Avi Weissman

  • -

    The course train and certify as an exclusive auditor to conduct a supply chain cybersecurity audit, according to the requirements defined by the Israel National Cyber Directorate (INCD).

    Study subjects:
    • The national methodology for protecting the supply chain and auditing suppliers.
    • The structure and certification processes of The Standards Institution of Israel (SII).
    • The national supply chain cyber security regulation.
    • The audit process, with an emphasis on…

    The course train and certify as an exclusive auditor to conduct a supply chain cybersecurity audit, according to the requirements defined by the Israel National Cyber Directorate (INCD).

    Study subjects:
    • The national methodology for protecting the supply chain and auditing suppliers.
    • The structure and certification processes of The Standards Institution of Israel (SII).
    • The national supply chain cyber security regulation.
    • The audit process, with an emphasis on technological audit.
    • The supply chain module in the Yuval system and the supplier questionnaire.
    • The process of conducting an audit of resistance to cyber risks.

  • -

    Instructor: Joe Helle | @TheMayor

    Course Topics
    - Username and Password List Generation
    - Password Spraying
    - Email Phishing
    - Command and Control (C2)
    - Credential Harvesting and Passing
    - Routing, Port Forwarding, SOCKS Proxies, and Bind Usage
    - Offensive PowerShell
    - How Misconfigurations Happen
    - Common Remediation Strategies

  • -

  • -

  • -

  • -

    Instructor: Brent Eskridge, Ph.D.
    Learning Objectives
    - Use common Linux commands and utilities
    - Find help on commands in Linux
    - Use advanced shell concepts such as pipes and command substitution
    - Understand the Linux filesystem hierarchy standard and use it to find files
    - Use regular expressions to execute powerful search and filter operations
    - Perform administrative actions
    - Develop short Linux shell scripts

  • -

    Instructor: Gerald Auger, Ph.D.
    A comprehensive program that delivers all major functions of the GRC analyst including Risk, Audit, Security Awareness, Governance, and hands-on labs to practice those skills.

  • -

  • - Present

  • -

  • -

  • -

  • -

  • -

    Instructor: Charles Harry, PhD

    Course Topics
    1. Defining Cyber, Security, and Cybersecurity Policy
    2. Evolution of the Internet
    3. Global Telecommunications Architecture and Governance
    4. Threat Actors and Their Motivations

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    This Specialization includes 3 Courses:
    1. NIST cybersecurity framework (CSF)
    2. NIST Risk Management Framework (RMF)
    3. NIST Special Publication 800-171 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

    Instructors: Ross Casanova, Dave Hatter

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Intensive Cyber Crisis Management course enhancing my skills in managing cyber threats through simulations and expert-led discussions. The curriculum covered forensic investigations, compliance, insurance, and crisis communication. Highlights included engaging with cybercrime dynamics, regulatory frameworks, and decision-making under pressure. Learned from industry leaders like Moty Cristal and Ram Levi, gaining insights into threat intelligence and effective strategies for cyber resilience…

    Intensive Cyber Crisis Management course enhancing my skills in managing cyber threats through simulations and expert-led discussions. The curriculum covered forensic investigations, compliance, insurance, and crisis communication. Highlights included engaging with cybercrime dynamics, regulatory frameworks, and decision-making under pressure. Learned from industry leaders like Moty Cristal and Ram Levi, gaining insights into threat intelligence and effective strategies for cyber resilience. This experience has significantly bolstered my capabilities in cybersecurity.

Licenses & Certifications

Volunteer Experience

Publications

  • Anti-Ransomware Day 2024: Understanding the Past, Present, and Future of Ransomware

    Explore the top 20 largest ransomware events from 2020 to 2024 and learn crucial strategies to protect your organization on Anti-Ransomware Day. Stay informed and safeguard your digital world.

    See publication
  • Redesigning NIST Cybersecurity Framework (CSF) 2.0 for Improved Usability

    Revamping the NIST CSF 2.0 for enhanced usability and collaboration—discover how these strategic updates make cybersecurity management more accessible and effective!

    See publication
  • Say Goodbye to Passwords: How Passkeys Are Setting New Security Standards

    Explore the shift from traditional passwords to passkeys, highlighting passkeys enhanced security and ease of use across various devices, making passkeys a robust solution for modern cybersecurity challenges.

    See publication
  • World Password Day 2024 - Embracing Passwordless Security: A Simpler, Safer Approach

    Examine the transition to passwordless authentication, emphasizing its necessity in bolstering security and simplifying user access in a world where traditional passwords fail. Outline the inherent risks of password reliance and showcase how modern technologies offer safer, more efficient alternatives.

    See publication
  • Celebrating World Backup Day: A Guide to Safeguarding Your Digital Life

    It's a day to not just reflect on the importance of securing our digital assets but to actively take steps to protect them. From personal memories captured in photos and videos to critical documents defining our professional lives, everything holds value beyond measure. This day serves as a crucial reminder that the act of backing up data is not a mere recommendation but a necessary safeguard against the unpredictable nature of technology and life itself.

    See publication
  • The Future of AWS Security: Insights into Amazon GuardDuty EC2 Runtime Monitoring

    Explore the groundbreaking launch of Amazon GuardDuty EC2 Runtime Monitoring, AWS's latest enhancement in cloud security that offers comprehensive threat detection and monitoring for EC2 workloads. Discover its key features, benefits, and how it revolutionizes threat detection and response in the AWS cloud environment.

    See publication
  • Version 2.0 of NIST Cybersecurity Framework: What You Need to Know

    The National Institute of Standards and Technology (NIST) has released Version 2.0 of its Cybersecurity Framework, a comprehensive guide to managing cybersecurity risks for organizations. This update reflects the growing importance of supply chain security, identity and access management, cybersecurity measurement and metrics, privacy integration, and threat and vulnerability management. The framework provides a flexible, risk-based approach to enhancing cybersecurity defenses, making it a…

    The National Institute of Standards and Technology (NIST) has released Version 2.0 of its Cybersecurity Framework, a comprehensive guide to managing cybersecurity risks for organizations. This update reflects the growing importance of supply chain security, identity and access management, cybersecurity measurement and metrics, privacy integration, and threat and vulnerability management. The framework provides a flexible, risk-based approach to enhancing cybersecurity defenses, making it a valuable resource for cybersecurity professionals, organizations, and policymakers.

    See publication
  • Infrastructure as Code (IaC) Made Easy - AWS IaC Generator

    Discover the latest innovation from AWS: the IaC Generator simplifies resource management, enabling seamless transition to Infrastructure as Code. With automated template generation, AWS users can streamline cloud adoption and drive efficiency effortlessly.

    See publication
  • Data Privacy Day 2024: Take Control of Your Data

    Explore the imperative of "Privacy by Design" and debunk 10 prevalent data privacy myths on Data Privacy Day 2024. From recognizing the value of personal data to navigating the digital landscape wisely, empower yourself with insights for a privacy-conscious future.

    See publication
  • The Privacy Protection Authority Issues Policy Document on Biometric Data Collection in the Workplace – Public Comments Invited

    Insights on The Privacy Protection Authority policy document addressing the use of biometric data for attendance control in the workplace.

    See publication
  • Fortinet Advances OT Security Platform with New Hardware and Enhanced Services

    Explore Fortinet's latest OT Security Platform advancements, featuring the rugged FortiSwitch 424F and hazardous environment-ready FortiAP 432F.

    See publication
  • Meet Fortinet Advisor: A Generative AI Assistant Revolutionizing Threat Investigation and Remediation

    Fortinet Advisor, driven by cutting-edge Generative AI, transforms cybersecurity by swiftly analyzing and remediating threats. Integrated into FortiSIEM and FortiSOAR, it empowers security teams for faster response in the ever-evolving threat landscape.

    See publication
  • Strengthening the Foundation: A Deep Dive into the General Requirements Module of INCD Cyber Supply Chain Methodology

    Explore the comprehensive foundation of cyber resilience with the General Requirements Module, encompassing vital categories from Corporate Administration to Events Management.

    See publication
  • Unlocking Cyber Resilience: INCD Cyber Supply Chain Methodology Explained

    The Israel National Cyber Directorate (INCD) Cyber Supply Chain Methodology Explained

    See publication
  • The Privacy Protection Authority Directive and Request for Information for Web Hosting and Data Processing Companies during Emergency Period

    Empowering data guardianship during critical times, the Privacy Protection Authority issues directives for web hosting and data processing companies, fostering collective resilience against evolving security challenges.

    See publication
  • Demand for Information and Documentation to Enhance Data Security in Web Hosting and Data Processing Companies during an Emergency Period

    The Privacy Protection Authority Demand for Information and Documentation to Enhance Data Security in Web Hosting and Data Processing Companies during an Emergency Period

    See publication
  • Unleashing Amazon Q: A Revolutionary AI-Powered Assistant for Developers and IT Professionals Michael Benis Michael Benis

    Amazon Q, AWS's groundbreaking AI-powered assistant, is set to transform the landscape of application development. Seamlessly integrated into the AWS ecosystem, Amazon Q offers a diverse range of capabilities, from intuitive conversational Q&A to personalized EC2 instance recommendations, troubleshooting errors in real-time, and even actively contributing to feature development within your preferred IDE. It's not just an assistant; it's your AI expert, streamlining every phase of application…

    Amazon Q, AWS's groundbreaking AI-powered assistant, is set to transform the landscape of application development. Seamlessly integrated into the AWS ecosystem, Amazon Q offers a diverse range of capabilities, from intuitive conversational Q&A to personalized EC2 instance recommendations, troubleshooting errors in real-time, and even actively contributing to feature development within your preferred IDE. It's not just an assistant; it's your AI expert, streamlining every phase of application building on AWS.

    See publication
  • Unlocking Unprecedented Performance: A Deep Dive into Amazon S3 Express One Zone Storage Class

    Amazon Web Services (AWS) has unveiled the groundbreaking Amazon S3 Express One Zone storage class, setting a new standard for cloud object storage performance. Boasting up to 10x faster data access than the S3 Standard class, this high-performance, single-Availability Zone solution is engineered for consistent single-digit millisecond request latency, making it an ideal choice for latency-sensitive applications and frequently accessed data. With a 50% reduction in API request costs and the…

    Amazon Web Services (AWS) has unveiled the groundbreaking Amazon S3 Express One Zone storage class, setting a new standard for cloud object storage performance. Boasting up to 10x faster data access than the S3 Standard class, this high-performance, single-Availability Zone solution is engineered for consistent single-digit millisecond request latency, making it an ideal choice for latency-sensitive applications and frequently accessed data. With a 50% reduction in API request costs and the ability to seamlessly scale without pre-provisioning, S3 Express One Zone empowers businesses to lower their total cost of ownership while efficiently handling millions of requests per minute. Co-locating storage with compute resources in a chosen Availability Zone further optimizes performance, delivering a storage solution that's not just efficient but also cost-effective.

    See publication
  • Unveiling AWS Backup - Automatic Restore Testing and Validation

    AWS Backup's latest feature, Automatic Restore Testing, revolutionizes data resilience in the cloud. This cutting-edge capability enables users to automate the validation of their AWS resources' recoverability, covering a spectrum of critical services such as Amazon EBS, EC2, Aurora, RDS, EFS, S3, DynamoDB, FSx, DocumentDB, and Neptune. By effortlessly initiating tests from the AWS Backup console, CLI, or SDK, organizations can fine-tune restore plans, validate backups, and ensure compliance…

    AWS Backup's latest feature, Automatic Restore Testing, revolutionizes data resilience in the cloud. This cutting-edge capability enables users to automate the validation of their AWS resources' recoverability, covering a spectrum of critical services such as Amazon EBS, EC2, Aurora, RDS, EFS, S3, DynamoDB, FSx, DocumentDB, and Neptune. By effortlessly initiating tests from the AWS Backup console, CLI, or SDK, organizations can fine-tune restore plans, validate backups, and ensure compliance with ease. This proactive approach not only safeguards against ransomware and data loss events but also empowers users to refine their recovery strategies for enhanced operational continuity.

    See publication
  • Revolutionizing Enterprise Computing: A Deep Dive into Amazon WorkSpaces Thin Client

    Revolutionizing the workplace, Amazon WorkSpaces Thin Client delivers secure, cost-effective virtual desktop solutions for the modern era of remote and hybrid work.

    See publication
  • AWS CloudFront Security Dashboard: Elevating Web Security

    Discover AWS CloudFront Security Dashboard – a unified, intuitive interface seamlessly integrating CloudFront and AWS WAF to fortify applications against evolving cyber threats.

    See publication
  • Revolutionizing Secure Remote Access: A Deep Dive into JumpCloud Integration with AWS Verified Access

    This integration of JumpCloud with AWS Verified Access revolutionizes secure remote access, elevating identity and device security management for a streamlined and advanced digital experience.

    See publication
  • Securely Connecting to Private EC2 Instances with EC2 Instance Connect Endpoint (EIC Endpoint)

    EC2 Instance Connect Endpoint is an identity-aware TCP proxy that enables secure connectivity to EC2 instances and other VPC resources from the Internet without the need for a bastion host or public IP addresses. It combines identity-based and network-based access controls, providing enhanced security and control over the connection process. The EIC Endpoint works with the AWS Management Console, AWS Command Line Interface (CLI), and popular client tools like PuTTY and OpenSSH.

    See publication
  • AWS WAF Fraud Control - Account Creation Fraud Prevention (ACFP)

    Account Creation Fraud Prevention (ACFP) by AWS WAF Fraud Control is designed to prevent the creation of fake or fraudulent accounts, safeguarding businesses from the costs and damages associated with account fraud. By continuously monitoring account sign-up pages and automatically blocking suspicious requests, ACFP provides comprehensive protection against activities like impersonation, bonus abuse, and phishing attacks. With reduced pricing and included bot mitigation rule actions, AWS WAF…

    Account Creation Fraud Prevention (ACFP) by AWS WAF Fraud Control is designed to prevent the creation of fake or fraudulent accounts, safeguarding businesses from the costs and damages associated with account fraud. By continuously monitoring account sign-up pages and automatically blocking suspicious requests, ACFP provides comprehensive protection against activities like impersonation, bonus abuse, and phishing attacks. With reduced pricing and included bot mitigation rule actions, AWS WAF Fraud Control offers a cost-effective solution for businesses to secure their customer relationships, reputation, and financial well-being.

    See publication
  • False Acceptance Rate (FAR)

    False Acceptance Rate (FAR), also known as the False Match Rate (FMR), is a biometric performance metric that measures the likelihood of a biometric system incorrectly accepting an impostor as a genuine user. It represents the rate at which the system incorrectly identifies an unauthorized individual as an authorized user.

    See publication
  • False Rejection Rate (FRR)

    False Rejection Rate (FRR) is a biometric performance metric that measures the probability of a biometric system incorrectly rejecting a genuine user. It represents the rate at which the system fails to match the biometric data of an authorized user, resulting in a false rejection or denial of access.

    See publication
  • Encryption

    Encryption is a crucial technique in information security that involves converting a message or data from its original form, known as plaintext, into an unreadable format called ciphertext. It is a process of encoding information using an encryption algorithm and a secret encryption key. The purpose of encryption is to ensure the confidentiality and integrity of data, protecting it from unauthorized access and tampering.

    See publication
  • Dynamic testing

    Dynamic testing is a software testing technique where the system or application under test is executed, and its behavior is observed and evaluated. It involves the active examination of the software to verify its functionality, performance, reliability, and other quality attributes.

    See publication
  • Encoding

    Encoding refers to the process of converting a message or data from one format or representation into another format using a specific set of rules or codes. It involves transforming information into a standardized format that can be easily transmitted, stored, or processed by computer systems or communication devices.

    See publication
  • Dynamic Ports

    Dynamic or Private Ports, also known as ephemeral ports, refer to a range of port numbers from 49152 to 65535 in the Internet Assigned Numbers Authority (IANA) port number range. These ports are used for dynamic allocation by client applications or services when establishing network connections.

    See publication
  • Due diligence

    Due diligence refers to the process of conducting thorough research, investigation, and analysis of a vendor or business before entering into a transaction, partnership, or agreement. It involves taking specific actions to assess the vendor's credibility, reputation, financial stability, operational capabilities, legal compliance, and other relevant factors.

    See publication
  • Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace

    Research by Mitiga has revealed a critical vulnerability that exposes organizations to data exfiltration and potential insider threats. The lack of activity logging in the free subscription of Google Workspace leaves users without a paid enterprise license blind to unauthorized downloads and manipulations of sensitive data in Google Drive.

    See publication
  • Amazon Security Lake

    Amazon Security Lake allows organizations to centralize security data from various sources, including Amazon Web Services (AWS) environments, software as a service (SaaS) providers, on-premises systems, and cloud sources.

    See publication
  • Due care

    Due care is a legal concept that refers to the duty owed by a service provider or professional to their customers or clients. It is a standard of care that requires the provider to act with the level of care, skill, and diligence that a reasonable person or professional in their position would exercise under similar circumstances.

    See publication
  • Discretionary Access Control (DAC)

    Discretionary Access Control (DAC) is a security model that allows the system owner or data owner to exercise control over access permissions and determine who can access specific resources or data within a system. In DAC, the owner has the discretion to grant or revoke access rights to individuals or groups based on their identities, roles, or relationships.

    See publication
  • Digital Certificate

    A digital certificate is an electronic document that serves as a digital identity credential for individuals or organizations. It contains important information, including the name of the entity or individual, their business address, a digital signature from a trusted certificate authority (CA), the holder's public key, a unique serial number, and an expiration date.

    See publication
  • Digital rights management (DRM)

    Digital Rights Management (DRM) refers to a set of technologies and methods employed to control and protect digital media content. It grants content providers, such as publishers, artists, or distributors, the ability to manage and enforce rights over their intellectual property in the digital realm. DRM often utilizes cryptography techniques to safeguard and control access, usage, copying, and distribution of digital content.

    See publication
  • Disaster Recovery (DR)

    Disaster Recovery (DR) refers to the processes, plans, and actions taken to restore an organization’s normal operations after a significant disruptive event. It involves the systematic recovery of critical business functions, IT systems, and data following a disaster or major incident.

    See publication
  • DevOps

    DevOps is a software development approach that combines software development (Dev) and IT operations (Ops) to improve collaboration, efficiency, and the overall software delivery lifecycle. It emphasizes the integration of development, testing, deployment, and operations processes to enable faster and more reliable software development and deployment.

    See publication
  • Defensible Destruction

    Defensible destruction refers to the process of eliminating data in a controlled, legally defensible, and regulatory-compliant manner. It involves securely disposing of data that is no longer needed or required, ensuring that it cannot be accessed or recovered by unauthorized individuals.

    See publication
  • Meta Fined Record $1.3 Billion by EU Regulators for Data Transfer Violations

    Meta (Facebook) Fined $1.3B by EU Regulators for Data Transfer Violations!
    The penalty stems from violations related to transferring user data from the EU to the US. The record-breaking fine emphasizes the importance of protecting user privacy and complying with data transfer regulations.

    See publication
  • Data Owner / Data Controller

    The data owner/controller is typically the organization or individual that collects personal data directly from individuals or receives it from other sources. It could be a business, government agency, non-profit organization, or any entity that processes personal data for specific purposes.

    See publication
  • Data subject

    Data subject refers to an individual who is the subject or focus of personal data that is being processed. The data subject is the person to whom the personal data relates, and they have certain rights and protections regarding the processing of their data.

    See publication
  • Database Management System (DBMS)

    Database Management System (DBMS) is a software application that enables users to efficiently store, organize, manage, and retrieve data from a database. It serves as an interface between the users and the underlying database, providing tools and functionalities to facilitate data management tasks.

    See publication
  • Database model

    A database model is a conceptual representation or blueprint that describes the structure, relationships, and rules for organizing and storing data within a database system. It provides a framework or set of guidelines for designing and implementing a database, ensuring that data elements are organized and related to each other in a logical manner.

    See publication
  • Decryption

    Decryption is the process of transforming encrypted or encoded data back into its original, readable form. It is the reverse operation of encryption, which converts plain, understandable data into a coded or encrypted format to protect it from unauthorized access or interception.

    See publication
  • World Password Day: The Importance of Strong Passwords and Passwordless Technology

    Happy World Password Day everyone!
    Are you tired of creating and remembering multiple passwords? It's time to embrace the future of authentication with passwordless technology.

    Explore the exciting developments in passwordless authentication and how they're changing the game. From biometric authentication to smart devices, there are many ways to secure your online accounts without relying on passwords.

    Discover how Google is implementing passwordless authentication and how…

    Happy World Password Day everyone!
    Are you tired of creating and remembering multiple passwords? It's time to embrace the future of authentication with passwordless technology.

    Explore the exciting developments in passwordless authentication and how they're changing the game. From biometric authentication to smart devices, there are many ways to secure your online accounts without relying on passwords.

    Discover how Google is implementing passwordless authentication and how this feature could revolutionize the way we log in to our accounts.

    So, let's celebrate World Password Day by saying goodbye to weak passwords and hello to the future of authentication!

    See publication
  • OTORIO Secures US Patent for Innovative OT Cybersecurity Risk Management Model and Algorithm

    OTORIO has secured a US patent for innovative operational network risk mitigation system and method. This proprietary algorithm sets a new standard in OT cybersecurity risk management, providing crucial context to OT cybersecurity posture and enabling organizations to prioritize and address risk effectively.

    Learn more about this groundbreaking technology and how it can help your organization stay ahead of emerging threats and safeguard your critical assets and processes. Don't miss out…

    OTORIO has secured a US patent for innovative operational network risk mitigation system and method. This proprietary algorithm sets a new standard in OT cybersecurity risk management, providing crucial context to OT cybersecurity posture and enabling organizations to prioritize and address risk effectively.

    Learn more about this groundbreaking technology and how it can help your organization stay ahead of emerging threats and safeguard your critical assets and processes. Don't miss out on this important update from the pioneer in the OT security market!

    See publication
  • GDPR Privacy Training: Ensuring Your Employees Are Up to Speed on Data Protection

    Explains the importance of GDPR privacy training for employees in order to comply with regulations and protect sensitive data. It highlights key topics such as data protection, consent, and security measures.

    See publication
  • World Backup Day: Don't Be a Statistic - Why You Need to Backup Your Data Today

    Explains the importance of data backup, and offers tips and statistics to encourage readers to protect their valuable information. Emphasizes the risks of data loss and the benefits of having a backup plan to raise awareness.

    See publication
  • Protecting Passengers and Operations: The Importance of TSA's New Cybersecurity Requirements Airports and Aircraft Operators

    The Transportation Security Administration (TSA) has issued new cybersecurity requirements for airports and aircraft operators to strengthen the security of the aviation industry against cyber attacks.

    The requirements include regular risk assessments, incident response plans, network security measures, third-party security compliance, and employee training.

    These measures aim to complement existing security measures, such as passenger and luggage screening, to protect the…

    The Transportation Security Administration (TSA) has issued new cybersecurity requirements for airports and aircraft operators to strengthen the security of the aviation industry against cyber attacks.

    The requirements include regular risk assessments, incident response plans, network security measures, third-party security compliance, and employee training.

    These measures aim to complement existing security measures, such as passenger and luggage screening, to protect the aviation industry from the growing threat of cyber attacks.

    See publication
  • Privacy Protection Authority (PPA) Raids Insurance Company for Suspected Illegal Trade in Personal Information

    The Privacy Protection Authority (PPA) Takes Firm Action Against Illegal Trade in Personal Information

    The PPA conducted a recent raid on several locations related to employees of an insurance company suspected of illegally releasing personal and financial information. The authority has emphasized the importance of protecting the sensitive information of insured persons and will continue to take firm action against any violations. It's crucial for all organizations handling personal…

    The Privacy Protection Authority (PPA) Takes Firm Action Against Illegal Trade in Personal Information

    The PPA conducted a recent raid on several locations related to employees of an insurance company suspected of illegally releasing personal and financial information. The authority has emphasized the importance of protecting the sensitive information of insured persons and will continue to take firm action against any violations. It's crucial for all organizations handling personal information to implement strong security measures and regularly train employees on privacy laws.

    See publication
  • OTORIO Research Team Finds Critical Vulnerability in Siemens PCS 7 System

    The OTORIO research team has uncovered a critical Remote Code Execution (RCE) vulnerability in Siemens servers, including Simatic PCS 7. This widely used component in industrial control systems (ICS) was found to have the potential for an attacker to remotely execute malicious code, giving them full control over the system and potentially causing significant harm to the affected organization. The OTORIO research team promptly reported the issue to Siemens, who have released a patch, with the US…

    The OTORIO research team has uncovered a critical Remote Code Execution (RCE) vulnerability in Siemens servers, including Simatic PCS 7. This widely used component in industrial control systems (ICS) was found to have the potential for an attacker to remotely execute malicious code, giving them full control over the system and potentially causing significant harm to the affected organization. The OTORIO research team promptly reported the issue to Siemens, who have released a patch, with the US Cybersecurity and Infrastructure Security Agency (CISA) issuing a warning for organizations to apply it as soon as possible.

    It is crucial for organizations using Siemens systems to take the Remote Code Execution (RCE) vulnerability seriously and apply the patch immediately to prevent a malicious attack. This serves as a reminder of the importance of being proactive in security measures and regularly assessing the security of industrial control systems. OTORIO's commitment to providing security solutions for industrial control systems (ICS) is demonstrated by its team of experienced security researchers who are dedicated to identifying and addressing potential security threats and ensuring the safety and reliability of industrial processes for organizations.

    See publication
  • Cyber Battlefront: The Distributed Denial of Service Attack on Israel's Internet Infrastructure During Military Operation in 2009

    The Distributed Denial of Service (DDoS) attack on Israel's internet infrastructure during the military operation in 2009 was a significant event in the history of cyber attacks. The attack, carried out by a criminal organization from the former Soviet Union and believed to have been funded by Hamas or Hezbollah, targeted government websites with a massive botnet consisting of at least 5 million computers. The scale of this attack was particularly notable and temporarily disrupted the online…

    The Distributed Denial of Service (DDoS) attack on Israel's internet infrastructure during the military operation in 2009 was a significant event in the history of cyber attacks. The attack, carried out by a criminal organization from the former Soviet Union and believed to have been funded by Hamas or Hezbollah, targeted government websites with a massive botnet consisting of at least 5 million computers. The scale of this attack was particularly notable and temporarily disrupted the online communications and access to information of the Israeli government.

    At the time, the incident was considered one of the largest DDoS attacks in history and served as a wake-up call for governments and organizations around the world to take the threat of cyber attacks more seriously. The attack highlighted the importance of robust cybersecurity measures and backup systems to defend against these types of incidents and ensure the continuity of operations.

    The incident was a turning point in the development of cybersecurity and led to an increased focus on developing and implementing new technologies and strategies to defend against DDoS attacks. This has resulted in a marked improvement in the ability of organizations to defend against these types of attacks and has helped to mitigate the impact of cyber attacks on critical infrastructure.

    See publication
  • Effective Implementation of Security Awareness Training

    In today's digital world, protecting sensitive information is crucial for organizations. Cyber-attacks are becoming increasingly common, and educating employees on how to protect sensitive information and identify security threats is essential. This is where Security Awareness Training comes in. It raises employees' awareness of security risks, promotes safe behavior, and minimizes the risk of security breaches.

    A well-designed Security Awareness Training program must be mandatory for…

    In today's digital world, protecting sensitive information is crucial for organizations. Cyber-attacks are becoming increasingly common, and educating employees on how to protect sensitive information and identify security threats is essential. This is where Security Awareness Training comes in. It raises employees' awareness of security risks, promotes safe behavior, and minimizes the risk of security breaches.

    A well-designed Security Awareness Training program must be mandatory for all employees, include real-world scenarios, incorporate regular assessments, and provide incentives for safe behavior. Regular updates and reviews are necessary to ensure the program remains effective, current with changing laws and regulations, and up-to-date with the latest security threats and best practices.

    Organizations that prioritize security and comply with relevant laws and regulations are more likely to be perceived as trustworthy by customers and partners, while increased productivity can be achieved by equipping employees with the knowledge and skills they need to identify security threats.

    See publication
  • Data Privacy Day 2023: The Impact of Privacy by Design

    Data Privacy Day is an important reminder of the need to protect personal information in our digital age. One key principle in achieving data privacy is "privacy by design." This approach to data protection focuses on integrating privacy considerations into the design and development of new technologies and systems. By considering privacy from the very beginning, organizations can ensure that they are taking the necessary steps to protect personal information.

    As we continue to rely on…

    Data Privacy Day is an important reminder of the need to protect personal information in our digital age. One key principle in achieving data privacy is "privacy by design." This approach to data protection focuses on integrating privacy considerations into the design and development of new technologies and systems. By considering privacy from the very beginning, organizations can ensure that they are taking the necessary steps to protect personal information.

    As we continue to rely on digital technologies in our personal and professional lives, it is crucial that we take a proactive approach to data privacy. By implementing privacy by design, we can ensure that the information we share is protected and that we have control over how it is used. Let's take this Data Privacy Day to commit to elevating data privacy and protecting our personal information.

    See publication
  • Designing for Security: Adopting a Secure by Design Approach

    In today's digital age, securing systems and applications is more important than ever. With the increasing number of cyber threats and attacks, it's crucial for organizations to adopt a secure-by-design approach. This approach emphasizes the integration of security considerations throughout the entire software development life cycle, from the initial design phase to the final deployment.

    The concept of secure-by-design is explained and its importance in the industry is explored. Covers…

    In today's digital age, securing systems and applications is more important than ever. With the increasing number of cyber threats and attacks, it's crucial for organizations to adopt a secure-by-design approach. This approach emphasizes the integration of security considerations throughout the entire software development life cycle, from the initial design phase to the final deployment.

    The concept of secure-by-design is explained and its importance in the industry is explored. Covers topics such as threat modeling, vulnerability management, and secure coding practices, as well as provides real-world examples and best practices for implementing a secure-by-design approach. Whether you're a software developer, cybersecurity professional, or simply someone with an interest in the field, this article is a must-read.

    See publication
  • From Breach to Recovery: The Pentagon's Operation Buckshot Yankee and the 2008 Cyber Attack on DOD and CENTCOM

    In November 2008, classified networks at the United States Department of Defense (DOD) and U.S. Central Command (CENTCOM) were compromised by unknown foreign intruders. The incident, known as Operation Buckshot Yankee, resulted in a wholesale review of U.S. cyber defense strategy and highlighted the dangers of cyber threats and the fragility of sensitive systems.

    Delve into the tactics, techniques, and procedures used by the attackers, as well as the technical details of the incident and…

    In November 2008, classified networks at the United States Department of Defense (DOD) and U.S. Central Command (CENTCOM) were compromised by unknown foreign intruders. The incident, known as Operation Buckshot Yankee, resulted in a wholesale review of U.S. cyber defense strategy and highlighted the dangers of cyber threats and the fragility of sensitive systems.

    Delve into the tactics, techniques, and procedures used by the attackers, as well as the technical details of the incident and its impact on the industry. The article also provides insights into the Pentagon's response and efforts to protect important industry networks.

    See publication
  • The $9 Million WorldPay Hack in 2008: A Case Study in Cybercrime and Payment Systems

    In November 2008, Royal Bank of Scotland’s Worldpay fell victim to a cyber attack that resulted in the theft of $9 million dollars from ATMs in 49 cities around the world. The incident was a complex and sophisticated attack that involved exploiting a vulnerability in the company's network, gaining access to a database containing the account numbers and personal identification numbers of payroll debit cards, and creating clones of the cards to be distributed to a worldwide network of "cashers"…

    In November 2008, Royal Bank of Scotland’s Worldpay fell victim to a cyber attack that resulted in the theft of $9 million dollars from ATMs in 49 cities around the world. The incident was a complex and sophisticated attack that involved exploiting a vulnerability in the company's network, gaining access to a database containing the account numbers and personal identification numbers of payroll debit cards, and creating clones of the cards to be distributed to a worldwide network of "cashers" who then withdrew money from ATMs in a coordinated attack.

    The incident highlights the vulnerability of payment systems and the importance of implementing robust security measures to protect against hacking and fraud. In the wake of the attack, Worldpay has implemented enhanced encryption and security protocols, improved monitoring and detection capabilities, and improved incident response and recovery procedures. It serves as a reminder of the ongoing need for vigilance in the fight against cybercrime.

    See publication
  • The TJX Hack: A Case Study in Retail Cybersecurity

    The TJX Companies, Inc. hack, which occurred in 2007, remains one of the largest and most impactful data breaches in history. The incident not only had a significant financial impact on the company, but it also raised important questions about the security practices of retailers and the need for better regulations to protect consumer data.

    As a reminder, it is crucial for retailers to implement and maintain robust security measures, including regular security audits, employee training…

    The TJX Companies, Inc. hack, which occurred in 2007, remains one of the largest and most impactful data breaches in history. The incident not only had a significant financial impact on the company, but it also raised important questions about the security practices of retailers and the need for better regulations to protect consumer data.

    As a reminder, it is crucial for retailers to implement and maintain robust security measures, including regular security audits, employee training, and the use of encryption and firewalls, to protect against data breaches. Let's not forget the importance of cyber security in our digital age.

    See publication
  • The Importance of Supply Chain Security: A Case Study on the 2008 Credit Card Reader Incident

    In October 2008, a highly sophisticated supply chain attack was discovered in the UK. Credit card readers, manufactured in China and used in supermarkets, were found to have a wireless device inserted in them. This device would copy credit card information when inserted and store it, then transfer the data it had collected once a day via WiFi connection to Lahore, Pakistan.

    The estimated loss from this attack was over $50 million. What made this attack particularly advanced was the…

    In October 2008, a highly sophisticated supply chain attack was discovered in the UK. Credit card readers, manufactured in China and used in supermarkets, were found to have a wireless device inserted in them. This device would copy credit card information when inserted and store it, then transfer the data it had collected once a day via WiFi connection to Lahore, Pakistan.

    The estimated loss from this attack was over $50 million. What made this attack particularly advanced was the device's ability to be instructed to only collect certain types of cards, or to go dormant to evade detection. It is a stark reminder of the importance of supply chain security and the potential consequences of neglecting it.

    See publication
  • The White House Hack: The Impact of Chinese Cyber Attacks

    In November 2008, Chinese hackers infiltrated the computer network of The White House and obtained emails between senior government officials. The National Cyber Investigative Joint Task Force, a unit established in 2007 to tackle cyber security, detected the attacks on The White House.

    Despite the efforts to patch the system, the hackers were able to access the White House computer system for brief periods, allowing them enough time to steal information. US government cyber intelligence…

    In November 2008, Chinese hackers infiltrated the computer network of The White House and obtained emails between senior government officials. The National Cyber Investigative Joint Task Force, a unit established in 2007 to tackle cyber security, detected the attacks on The White House.

    Despite the efforts to patch the system, the hackers were able to access the White House computer system for brief periods, allowing them enough time to steal information. US government cyber intelligence experts suspect the attacks were sponsored by the Chinese government due to their targeted nature. But it is difficult to trace the exact source of an attack beyond a server in a particular country.

    See publication
  • Election Interference through Cyber Means: The 2008 US Presidential Campaign Hacks

    In 2008, unknown foreign intruders successfully hacked and downloaded the databases of both the Republican and Democratic presidential campaigns.

    The article delves into the significance of the incident, the impact on the campaigns, and the importance of proper cyber security measures.

    Don't miss out on this retrospective of a significant moment in cybersecurity history.

    See publication
  • Stealing the Crown Jewels: The 2008 Oil Industry Cyber Intrusion

    In 2008, three major US oil companies - Marathon Oil Corporation, ExxonMobil, and ConocoPhillips - were targeted by cyberattacks that may have originated in China. The attackers were able to steal valuable "bid data" detailing the quantity, value, and location of oil discoveries worldwide.

    The incident highlights the vulnerability of the oil industry to cyber attacks and the importance of proper cyber security measures. It also serves as a reminder that cyber-attacks are not just a…

    In 2008, three major US oil companies - Marathon Oil Corporation, ExxonMobil, and ConocoPhillips - were targeted by cyberattacks that may have originated in China. The attackers were able to steal valuable "bid data" detailing the quantity, value, and location of oil discoveries worldwide.

    The incident highlights the vulnerability of the oil industry to cyber attacks and the importance of proper cyber security measures. It also serves as a reminder that cyber-attacks are not just a theoretical threat, but a real and present danger that can cause significant financial losses and affect national security.

    See publication
  • The 2008 Chinese Cyber Assaults on India: A Turning Point in Cybersecurity History

    In 2008, China launched a sustained cyber attack on India, targeting government and private networks. The article delves into the tactics used, the impact on India, and the importance of proper cyber defense.

    Don't miss out on this retrospective of a significant moment in cybersecurity history.

    See publication
  • PayPal Hack: How Credential Stuffing Compromised 35,000 Accounts

    In today's digital age, data breaches and cyber attacks are becoming increasingly common. The recent PayPal hack is a prime example of this, as it exposed the personal information of nearly 35,000 customers.

    But what sets this hack apart from others is the method used by the attackers - Credential Stuffing. This article dive into the technical details of this attack vector and its impact on the industry. From the tactics, techniques, and procedures used, to the importance of strong and…

    In today's digital age, data breaches and cyber attacks are becoming increasingly common. The recent PayPal hack is a prime example of this, as it exposed the personal information of nearly 35,000 customers.

    But what sets this hack apart from others is the method used by the attackers - Credential Stuffing. This article dive into the technical details of this attack vector and its impact on the industry. From the tactics, techniques, and procedures used, to the importance of strong and unique passwords.

    See publication
  • The head of Britain's Security Service (MI5) Warns Businesses of Increased Cyber Threats from Russian and Chinese State Organizations in 2007

    The head of Britain's Security Service (MI5), Jonathan Evans, warned in 2007 about 300 business firms of the increased online threat from Russian and Chinese state organizations.

    This is a reminder of the need for organizations to not only implement security measures but also train employees to recognize and avoid spear phishing emails. It's also important to have incident response plans in place in case of a breach.

    See publication
  • The Oak Ridge National Laboratory Cyber Incident of 2007: A Case Study in Spear Phishing

    The Oak Ridge National Laboratory (ORNL) experienced a cyber incident in October 2007 where more than a thousand staffers received an email with an attachment that, when opened, provided unknown outsiders with access to the Lab's databases.

    This incident highlights the importance of employee awareness and education in preventing spear phishing attacks. Learn more about the tactics, techniques, and procedures used in the attack, and the impact of the incident on the industry in this…

    The Oak Ridge National Laboratory (ORNL) experienced a cyber incident in October 2007 where more than a thousand staffers received an email with an attachment that, when opened, provided unknown outsiders with access to the Lab's databases.

    This incident highlights the importance of employee awareness and education in preventing spear phishing attacks. Learn more about the tactics, techniques, and procedures used in the attack, and the impact of the incident on the industry in this article.

    See publication
  • 2007 China Aerospace Science & Industry Corporation (CASIC) Network Breach by Foreign Hackers

    As the world becomes increasingly dependent on technology, the threat of cyber attacks is growing. In 2007, the Chinese Ministry of State Security reported that foreign hackers, 42% of whom were believed to be from Taiwan and 25% from the United States, had been stealing information from key areas in China.

    This is a reminder that cyber threats are global and that we all need to work together to combat them.

    It's important to stay informed about the latest cybersecurity trends…

    As the world becomes increasingly dependent on technology, the threat of cyber attacks is growing. In 2007, the Chinese Ministry of State Security reported that foreign hackers, 42% of whom were believed to be from Taiwan and 25% from the United States, had been stealing information from key areas in China.

    This is a reminder that cyber threats are global and that we all need to work together to combat them.

    It's important to stay informed about the latest cybersecurity trends and to take steps to protect ourselves and our organizations.

    See publication
  • Contractor Cybersecurity: Lessons from the 2007 DHS and DOD Hack

    In September 2007, a cyber incident occurred where contractors employed by the Department of Homeland Security (DHS) and the Department of Defense (DOD) had their networks hacked.

    The attackers were able to gain access to the networks by using a variety of tactics, including spear phishing, malware, and network penetration.

    The incident serves as a reminder of the importance of proper security controls and incident response plans for contractors handling sensitive information…

    In September 2007, a cyber incident occurred where contractors employed by the Department of Homeland Security (DHS) and the Department of Defense (DOD) had their networks hacked.

    The attackers were able to gain access to the networks by using a variety of tactics, including spear phishing, malware, and network penetration.

    The incident serves as a reminder of the importance of proper security controls and incident response plans for contractors handling sensitive information and systems.

    It also highlights the need for regular security assessments and penetration testing to identify and address vulnerabilities in contractor networks.

    See publication
  • International Cybersecurity Challenges: The 2007 Hack of British Government Networks

    In September 2007, British authorities reported a cyber incident where hackers believed to have come from China's People's Liberation Army (PLA) successfully penetrated the network of the Foreign Office and other key government departments.

    The incident serves as a reminder of the importance of proper security controls and incident response plans to defend against advanced and targeted cyber attacks. It also highlights the need for international cooperation in addressing state-sponsored…

    In September 2007, British authorities reported a cyber incident where hackers believed to have come from China's People's Liberation Army (PLA) successfully penetrated the network of the Foreign Office and other key government departments.

    The incident serves as a reminder of the importance of proper security controls and incident response plans to defend against advanced and targeted cyber attacks. It also highlights the need for international cooperation in addressing state-sponsored cyber threats.

    See publication
  • Israel's Cyber Strike: The 2007 Attack on Syria's Air Defenses

    The Evolution of Warfare: In September 2007, Israel reportedly disrupted Syrian air defense networks during a bombing of an alleged Syrian nuclear facility, marking one of the first known instances of a military operation where cyber warfare tactics were used to disrupt an adversary's military systems.

    The incident highlights the growing importance of cyber warfare in modern military operations and the potential impact of cyber attacks on critical infrastructure. It also raises concerns…

    The Evolution of Warfare: In September 2007, Israel reportedly disrupted Syrian air defense networks during a bombing of an alleged Syrian nuclear facility, marking one of the first known instances of a military operation where cyber warfare tactics were used to disrupt an adversary's military systems.

    The incident highlights the growing importance of cyber warfare in modern military operations and the potential impact of cyber attacks on critical infrastructure. It also raises concerns about the potential for collateral damage to civilian networks and the ethical implications of cyber warfare.

    This is a reminder of the critical importance of cybersecurity in not just protecting our own systems and data, but also in ensuring that our military operations are effective and efficient. As we continue to see the use of cyber tactics in military operations, it is crucial that we stay aware and informed about the latest developments in this field.

    See publication
  • The 2007 Estonian DDoS Attack: A Turning Point in Cybersecurity History

    The Importance of Cyber Resilience: In May 2007, the Estonian government networks were targeted by a distributed denial of service (DDoS) attack by unknown foreign intruders, most likely at the behest of the Russian government.

    The attack resulted in the disruption of some government online services and the temporary halting of online banking. This incident highlighted the need for countries to have effective cyber incident response plans and the importance of international cooperation…

    The Importance of Cyber Resilience: In May 2007, the Estonian government networks were targeted by a distributed denial of service (DDoS) attack by unknown foreign intruders, most likely at the behest of the Russian government.

    The attack resulted in the disruption of some government online services and the temporary halting of online banking. This incident highlighted the need for countries to have effective cyber incident response plans and the importance of international cooperation in addressing state-sponsored cyber attacks.

    It also served as a wake-up call for other countries to improve their cyber defenses and to be prepared for potential state-sponsored cyber attacks.

    See publication
  • The 2007 French Hack: A Look into Chinese State-Sponsored Cyber Espionage

    The Growing Threat of State-Sponsored Cyber Espionage: In September 2007, the Secretary-General of National Defence in France publicly stated that information systems in France had been infiltrated by groups from China.

    This incident was one of the first known instances of Chinese state-sponsored cyber espionage against a Western nation and highlights the growing threat of cyber attacks on national security and critical infrastructure.

    See publication
  • The Cost of Cyber Insecurity: The Secretary of Defense Email Incident

    The Importance of Cybersecurity in National Defense: In June 2007, the Secretary of Defense's unclassified email account was hacked by unknown foreign intruders as part of a larger series of attacks to access and exploit Department of Defense (DOD) networks.

    This incident was a significant security breach that raised concerns about the security of government networks and the potential impact of cyber attacks on national security. It highlights the need for improved cybersecurity…

    The Importance of Cybersecurity in National Defense: In June 2007, the Secretary of Defense's unclassified email account was hacked by unknown foreign intruders as part of a larger series of attacks to access and exploit Department of Defense (DOD) networks.

    This incident was a significant security breach that raised concerns about the security of government networks and the potential impact of cyber attacks on national security. It highlights the need for improved cybersecurity measures to protect government networks and sensitive information.

    See publication
  • The Impact of Cyber Attacks on National Economic Security: The 2007 Bureau of Industry and Security (BIS) Incident

    The Importance of Cybersecurity in Protecting Economic Interests: In 2007, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) had to take its networks offline for several months due to a cyber attack by unknown foreign intruders.

    The BIS is responsible for enforcing laws and regulations that control the export of sensitive US technology and data, making it a valuable target for foreign adversaries seeking to gain an economic advantage.

    This incident…

    The Importance of Cybersecurity in Protecting Economic Interests: In 2007, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) had to take its networks offline for several months due to a cyber attack by unknown foreign intruders.

    The BIS is responsible for enforcing laws and regulations that control the export of sensitive US technology and data, making it a valuable target for foreign adversaries seeking to gain an economic advantage.

    This incident highlights the ongoing threat of nation-state cyber attacks on government networks and the importance of strong cybersecurity measures to protect critical infrastructure and sensitive information.

    See publication
  • The National Defense University Cyber Incident: A Case Study in Government Cybersecurity

    The Importance of Cybersecurity in National Defense: In May 2007, the National Defense University (NDU) had to take its email systems offline because of hacks by unknown foreign intruders that left spyware on the system.

    NDU is a prominent institution that educates senior military and civilian leaders, making it a valuable target for foreign adversaries seeking to gain access to sensitive information and intelligence.

    This incident highlights the ongoing threat of cyber attacks…

    The Importance of Cybersecurity in National Defense: In May 2007, the National Defense University (NDU) had to take its email systems offline because of hacks by unknown foreign intruders that left spyware on the system.

    NDU is a prominent institution that educates senior military and civilian leaders, making it a valuable target for foreign adversaries seeking to gain access to sensitive information and intelligence.

    This incident highlights the ongoing threat of cyber attacks on government networks and the importance of strong cybersecurity measures to protect critical infrastructure and sensitive information.

    See publication
  • Securing Critical Infrastructure: Lessons Learned from the 2006 NASA Incident

    Cybersecurity in Critical Infrastructure: In December 2006, NASA - National Aeronautics and Space Administration was forced to take drastic measures to protect against cyber attacks on its networks before shuttle launches. The space agency blocked emails with attachments out of fear they would be hacked and reported that plans for the U.S. space launch vehicles had been obtained by unknown foreign intruders. This incident highlights the growing concern about cyber espionage and the potential…

    Cybersecurity in Critical Infrastructure: In December 2006, NASA - National Aeronautics and Space Administration was forced to take drastic measures to protect against cyber attacks on its networks before shuttle launches. The space agency blocked emails with attachments out of fear they would be hacked and reported that plans for the U.S. space launch vehicles had been obtained by unknown foreign intruders. This incident highlights the growing concern about cyber espionage and the potential impact it can have on national security and critical infrastructure.

    See publication
  • The 2006 House of Commons Cyber Incident: A Case Study in Government Cybersecurity

    The Importance of Cybersecurity in Government: In 2006, the computer system of the House of Commons (the lower house of the Parliament of the United Kingdom) was shut down due to a cyber attack thought to have been carried out by Chinese hackers, resulting in the disruption of parliamentary activities and the loss of sensitive information.

    The incident highlights the ongoing threat of nation-state cyber attacks and the need for strong cybersecurity measures to protect critical…

    The Importance of Cybersecurity in Government: In 2006, the computer system of the House of Commons (the lower house of the Parliament of the United Kingdom) was shut down due to a cyber attack thought to have been carried out by Chinese hackers, resulting in the disruption of parliamentary activities and the loss of sensitive information.

    The incident highlights the ongoing threat of nation-state cyber attacks and the need for strong cybersecurity measures to protect critical infrastructure and sensitive information within the government.

    See publication
  • The Impact of Cyber Attacks on Military Technology: The 2007 Joint Strike Fighter Project

    The Importance of Cybersecurity in the Military Industry: In 2007, Chinese hackers breached the Pentagon’s Joint Strike Fighter project and stole data related to the F-35 fighter jet. The incident highlights the ongoing threat of nation-state cyber attacks and the need for strong cybersecurity measures to protect critical infrastructure and sensitive information.

    See publication
  • Uncovering the Damage: The Impact of the 2006 US Naval War College Cyber Attack

    Cybersecurity in the military: In November 2006, hackers attempted to penetrate the networks of the U.S. Naval War College resulting in a two-week shutdown of the college's computer and email systems.

    China was suspected as the origin of the attack and it highlighted the vulnerabilities of military network architecture and security controls.

    This incident serves as a reminder of the importance of cybersecurity in protecting critical infrastructure and sensitive information, and…

    Cybersecurity in the military: In November 2006, hackers attempted to penetrate the networks of the U.S. Naval War College resulting in a two-week shutdown of the college's computer and email systems.

    China was suspected as the origin of the attack and it highlighted the vulnerabilities of military network architecture and security controls.

    This incident serves as a reminder of the importance of cybersecurity in protecting critical infrastructure and sensitive information, and the need for organizations to take proactive measures to detect and prevent cyber-attacks.

    See publication
  • A Wake-Up Call for Cyber Defense: The 2006 NIPRNet Breach

    A reminder of the importance of cybersecurity in the military: In August 2006, China successfully downloaded 10-20 terabytes of data from the Non-Classified IP Router Network (NIPRNet), an unclassified military network used by the US Department of Defense.

    This incident highlighted vulnerabilities in military network architecture and security controls and prompted significant changes in military cyber defense operations.

    See publication
  • The Advanced Persistent Threat: A Look into the May-July 2006 Cyber Intrusion on the Department of State Computer Network

    The May-July 2006 cyber intrusion on the U.S. Department of State's computer network is a prime example of the sophisticated tactics and techniques used by advanced persistent threat (APT) actors. In this article, take a closer look at the incident, the response, and the lessons learned for organizations to better protect against APT attacks.

    See publication
  • NASA's Network Security Breaches: A Brief History

    Did you know that NASA - National Aeronautics and Space Administration has a history of being targeted by hackers? A 2008 report by Bloomberg Businessweek revealed a series of cyber attacks against the agency's computer networks, including the Goddard Space Flight Center, the Marshall Space Flight Center, and the Kennedy Space Center. These attacks, which have been occurring for over a decade, have often been linked to foreign governments. It's important for agencies like NASA to prioritize…

    Did you know that NASA - National Aeronautics and Space Administration has a history of being targeted by hackers? A 2008 report by Bloomberg Businessweek revealed a series of cyber attacks against the agency's computer networks, including the Goddard Space Flight Center, the Marshall Space Flight Center, and the Kennedy Space Center. These attacks, which have been occurring for over a decade, have often been linked to foreign governments. It's important for agencies like NASA to prioritize network security and implement strong measures to protect against future threats.

    See publication
  • Titan Rain: The 2005 Cyber Attacks on the US Department of Defense

    An article about the "Titan Rain" cyber attacks that occurred in 2005. These attacks, which are believed to have been carried out by Chinese hackers, targeted the US Department of Defense and various defense contractors, including the Army Information Systems Engineering Command, the Defense Information Systems Agency, the Naval Ocean Systems Center, and the U.S. Army Space and Strategic Defense installation.

    Discuss the response of the US government to the attacks and the measures that…

    An article about the "Titan Rain" cyber attacks that occurred in 2005. These attacks, which are believed to have been carried out by Chinese hackers, targeted the US Department of Defense and various defense contractors, including the Army Information Systems Engineering Command, the Defense Information Systems Agency, the Naval Ocean Systems Center, and the U.S. Army Space and Strategic Defense installation.

    Discuss the response of the US government to the attacks and the measures that were implemented to improve the security of computer systems and protect against future attacks.
    This article provides a look at a significant cyber event that had significant consequences for the US government and military.

    See publication
  • Chinese Hackers Exfiltrate Sensitive Data from Naval Air Weapons Station China Lake in 2003 Cyber Attack

    A significant cyber event that occurred in 2003. Discussing the the attack in which Chinese hackers were able to exfiltrate sensitive national security information from the Naval Air Weapons Station China Lake in California, including nuclear weapons test and design data and stealth aircraft data.

    Address the response of the US government to the incident and the measures that were implemented to improve the security of computer systems and protect against future attacks.

    This…

    A significant cyber event that occurred in 2003. Discussing the the attack in which Chinese hackers were able to exfiltrate sensitive national security information from the Naval Air Weapons Station China Lake in California, including nuclear weapons test and design data and stealth aircraft data.

    Address the response of the US government to the incident and the measures that were implemented to improve the security of computer systems and protect against future attacks.

    This article provides a look at a significant cyber event that had significant consequences for the US government and military.

    See publication
  • NIS2, the EU Network and Information Systems Directive

    Cyberiom

    NIS2, the Network and Information Systems Directive is a directive of the European Union (EU) that aims to improve the security and resilience of network and information systems and to increase the level of cybersecurity in the EU.

    See publication

Courses

  • 101. CISSP – Certified Information Systems Security Professional - (ISC)²

    -

  • 102. CISM - Certified Information Security Manager - ISACA

    -

  • 103. CISO (Chief Information Security Officer) & DPO (Data Protection Officer) , 270 Hours, Bar-Ilan University

    -

  • 104. Cyber Security Expert with Specialization in Virtualization and Cloud | Certified Network Defender (CND), 325 Hours, at Bar-Ilan University

    CND38

  • 105. Certified Hands-on Cyber Security Specialist (CHCSS) - 306 Hours, Kernelios

    -

  • 106. Amazon Web Services (AWS) - AWS Certified Solutions Architect – Associate

    -

  • 107. Amazon Web Services - AWS Certified Cloud Practitioner

    -

  • 108. Amazon Web Services (AWS) - AWS Academy Graduate

    -

  • 109. VMware Certified Professional - Data Center Virtualization (VCP-DCV) [vSphere]

    -

  • 110. VMware Certified Professional - Network Virtualization (VCP-NV) [NSX]

    -

  • 111. CCNP Security - Cisco Certified Network Professional Security

    -

  • 199. Information and Communication Technologies (ICT) Technician - 254 Hours at Academy of Communication, Teleprocessing and Cybersecurity, Israel Defense Forces

    -

  • Aruba Networking Essentials

    -

  • CCSK - Certificate of Cloud Security Knowledge - Cloud Security Alliance (CSA)

    -

  • Check Point Certified Expert (CCSE)

    -

  • Check Point Certified Security Administrator (CCSA)

    -

  • Cisco Certified Network Associate (CCNA)

    -

  • Cisco Certified Specialist - Security Identity Management Implementation

    -

  • CompTIA Network+

    -

  • CompTIA Security+ Certified Security Professional

    -

  • Cybersecurity for Everyone, University of Maryland

    -

  • Definitive GRC Analyst - Simply Cyber

    -

  • Forensics - ITSafe

    -

  • Fortinet Network Security Expert Level 1: Certified Associate (NSE1)

    -

  • Fortinet Network Security Expert Level 2: Certified Associate (NSE2)

    -

  • Fortinet Network Security Expert Level 3: Certified Associate (NSE3)

    -

  • Fortinet Network Security Expert Level 4: Certified Professional (NSE4)

    -

  • Google Cloud Digital Leader Training Professional Certificate

    -

  • Google Cloud Workspace Administration

    -

  • Hikvision Certified Security Associate (HCSA)

    -

  • Hikvision Certified Security Associate - Alarm, Access Control and Video Intercom (HCSA-AAI)

    -

  • Hikvision Certified Security Associate - Video Management Systems (HCSA-VMS)

    -

  • Hikvision Certified Security Associate Alarm Access Control and Video Intercom Certification - HCSA-AAI

    -

  • Hikvision Certified Security Professional (HCSP)

    -

  • Introduction to Cybersecurity - 15 Hours, Cisco Network Academy

    -

  • Israel National Cyber Directorate (INCD) Cyber Defense Doctrine 2.0 - Implementing Threat-Informed Defense and Evidence-Based Security

    -

  • Linux Professional Institute LPI Certified Linux Essentials

    -

  • Linux Professional Institute LPI LPIC-1

    -

  • Microsoft Certified: Azure Security Engineer Associate

    -

  • Movement, Pivoting and Persistence for Pentesters and Ethical Hackers | Instructor: Joe Helle @TheMayor

    -

  • OPSWAT Data-Transfer Security Associate

    -

  • OPSWAT Email Security Associate (OESA)

    -

  • OPSWAT Endpoint Compliance Associate (OECA)

    -

  • OPSWAT Legacy-System Security Associate (OLSA)

    -

  • OPSWAT Network Security Associate (ONSA)

    -

  • OPSWAT Secure Storage Associate (OSSA)

    -

  • OPSWAT Web Traffic Protection Associate (OWPA)

    -

  • PCEP – Certified Entry-Level Python Programmer - Python Institue

    -

  • Privacy Protection Officer (PPO)

    -

  • Supply Chain Cyber Security Certified Auditor - 60 Hours, The Standards Institution of Israel (SII) / Israel National Cyber Directorate (INCD)

    -

Languages

  • English

    -

  • Hebrew

    -

  • Russian

    -

Organizations

  • (ISC)² - International Information Systems Security Certification Consortium

    -

  • ISACA - Information Systems Audit and Control Association

    -

  • OWASP (The Open Worldwide Application Security Project)

    -

    OWASP is a nonprofit foundation that works to improve the security of software. Our programming includes: - Community-led open source software projects - Over 250+ local chapters worldwide - Tens of thousands of members - Industry-leading educational and training conferences An open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to…

    OWASP is a nonprofit foundation that works to improve the security of software. Our programming includes: - Community-led open source software projects - Over 250+ local chapters worldwide - Tens of thousands of members - Industry-leading educational and training conferences An open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security. The OWASP Foundation launched in 2001. For more than two decades corporations, foundations, developers, and volunteers have supported the OWASP Foundation and its work.

Recommendations received

More activity by Michael

View Michael’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Michael Benis

Add new skills with these courses