DevOps
DevOps
Feb 18, 2022 · Information Security

Understanding Software Supply Chain Attacks and Six Steps to Harden Your Supply Chain

This article explains what software supply chain attacks are, illustrates recent high‑profile examples such as SolarWinds, Codecov, and EventStream, and outlines six practical steps—including trusted dependencies, vulnerability scanning, smart patching, network segmentation, zero‑trust authentication, and secret management—to reduce risk and mitigate damage.

Attack Mitigation
0 likes · 13 min read
Understanding Software Supply Chain Attacks and Six Steps to Harden Your Supply Chain
Open Source Linux
Open Source Linux
Sep 12, 2021 · Information Security

Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies

This article explains what DDoS attacks are, outlines their severe business, reputation, and data‑leakage impacts, highlights recent growth trends, and offers practical prevention measures such as bandwidth scaling and professional high‑defense services.

Attack MitigationCybersecurityDDoS
0 likes · 6 min read
Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies
ITPUB
ITPUB
Sep 11, 2020 · Blockchain

How Red Pulse Secured Its Blockchain Platform: Real‑World Attack Lessons

This article details Red Pulse's journey of integrating the NEO blockchain, the security vulnerabilities it faced—from token theft and credential‑stuffing attacks to sophisticated social‑engineering exploits—and the comprehensive technical measures, monitoring tools, and mitigation strategies it implemented to protect its platform and users.

Attack MitigationMonitoringNEO
0 likes · 21 min read
How Red Pulse Secured Its Blockchain Platform: Real‑World Attack Lessons
ITPUB
ITPUB
Feb 25, 2018 · Information Security

How CSRF Attacks Exploit Cookies and How to Defend Against Them

This article explains the mechanics of Cross‑Site Request Forgery (CSRF) attacks—including a step‑by‑step example of password‑change exploitation—lists the four essential conditions for a successful CSRF, introduces the related Server‑Side Request Forgery (SSRF) threat, and provides practical mitigation strategies for both vulnerabilities.

Attack MitigationCSRFCross-Site Request Forgery
0 likes · 9 min read
How CSRF Attacks Exploit Cookies and How to Defend Against Them