In the Dark About Supply Chain Vulnerabilities

In the Dark About Supply Chain Vulnerabilities

The software supply chain can create a seemingly endless attack surface. Here’s what you can do to better protect it. Is the “Barium” hacking collective Chinese? Russian? North Korean? It really doesn’t ...
Security Boulevard
Sound Hijacking – Abusing Missing XFO

Sound Hijacking – Abusing Missing XFO

| | hijacking
A Clickjacking attack works by loading a malicious website inside a low-opacity iframe and overlaying it with an innocuous looking button, checkbox or link. This tricks the user into interacting with the ...

Violent Piracy in Southeast Asia – A Feature of the Past?

ReCaap’s July 2018 Monthly Report recorded not only a year-on-year decline in piracy incidents for January to July compared to 2017, but also a significant reduction in the number of violent incidents ...

Gulf of Guinea: Mother ships used to target vessels deep offshore

PDF Download An approach by a pirate action group (PAG) using a mother ship approximately 280NM south of Lomé, Togo, during July marked the furthest offshore incident recorded by NYA since 17 ...