removed some personal things that were not on point with what i was trying to say
This commit is contained in:
parent
01b3db6dec
commit
3fe3e44109
1 changed files with 3 additions and 4 deletions
|
@ -15,7 +15,7 @@ have compromised many of the internal government networks and work is ongoing to
|
|||
investigate the damage of companies and government agencies alike.
|
||||
|
||||
As I am fairly fresh into a new security research position at [Kenna Security](https://www.kennasecurity.com/)
|
||||
I want to begin this with a realization that targeted hacking has been going on for years. Me being a civilian, I have limited insight into the true nature of the intelligence operations that are constantly occurring across both the civilian/corporate internet and militarized networks. But I still do understand that this is something that is constantly occurring and one of the prime motivators for me to start learning about this space. I wanted to understand how the world works, and who controls the computers that control everything.
|
||||
I want to begin this with a realization that targeted hacking has been going on for years.
|
||||
|
||||
Information control is everything in the world today, and the United States
|
||||
intelligence agencies have developed the systems to capture and collect
|
||||
|
@ -25,11 +25,10 @@ incident response teams and really really skilled hackers and programmers to try
|
|||
rebuild things in a much more secure manner and track the nation state hackers
|
||||
footprints.
|
||||
|
||||
I will be doing my best to start to better track down threat actors around the
|
||||
internet. Everybody in this space that is responsbile for securing
|
||||
Everybody in this space that is responsbile for securing
|
||||
infrastructure needs to always have a paranoid mindset and understand the
|
||||
realization of the world that we are in today. SolarWinds will not be the first
|
||||
example of this as we the future continue to unfold.
|
||||
example of this as the future unfolds.
|
||||
|
||||
### Source list:
|
||||
- [FireEye Advisory](https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html)
|
||||
|
|
Loading…
Add table
Reference in a new issue