For this Cybersecurity project, I had to research news articles to find examples of CyberSecurity attacks in the real world and explain how impactful they are. I also took a course in CyberSecurity and earned a certificate so I am now more educated on the do's and don'ts of how to protect from a security breach.
After completing this assignment, I learned how easy it is to fall victim to Cybersecurity breaches. People dedicate their whole lives to hacking people and they have become very clever in disguising themselves to look like the real thing, making it easier for people to willingly turn over their personal information.
Iranian hackers gained access to Israeli organizations by conducting destructive cyberattacks on their software, including wiper malware and hack-and-leak operations, website takedowns, and espionage campaigns. This has affected the Israeli government, infrastructure, organizations, and surveillance cameras across the region. I would recommend using stronger passwords and potentially investing in higher-quality software to prevent these security breaches from happening again, especially when they are in the middle of an ongoing war.
Who published the content? Sam Sabin
Where was it published? Axios Codebook
When was it published? November 21st, 2023
The truthfulness and integrity of the facts: Considered accurate facts obtained by multiple linked news sources
How is it written and presented? Minimal ads and presented with bullet points highlighting the importance of these statements
Links and Citations: Embedded website links and references to information found by Microsoft
Microsoft Threat Intelligence revealed that North Korean hackers have gained access to a software company called CyberLink allowing them to gain access to associated networks and devices. They achieved this by trojan malware and it seems that someone inside CyberLink's own infrastructure accidentally gave them access. This has affected over 100 devices in multiple countries like Japan, Taiwan, Canada, and the United States. In cases like these, employees need to be especially suspicious of emails and to double-check who is asking to access such information.
Who published the content? Rojoef Manuel
Where was it published? The Defense Post
When was it published? November 24th, 2023
The truthfulness and integrity of the facts: Included quotes from Microsoft Threat Intelligence
How is it written and presented? A short read but professionally written
Links and Citations: No links were included, just a couple of quotes
The other portion of this assignment was to take a course on Cybersecurity to help gain a further understanding of how easy it is to fall into these traps and how to take measures to prevent it from happening.