The lines of defense: 20 must-read articles for cybersecurity wizards on their summer vacation
About Source Defense
We provide the ONLY prevention solution for malicious activity originated from website supply chain vendors, Learn more on how it works.
We would all like to catch up on our reading and improve our professional skills, so why not achieve two goals with one click? If you wish to take the time on your upcoming vacation to enjoy a brilliant text that was recommended by the leaders of the cybersecurity arena, here are 20 suggestions to expand your horizons on website security, Magecart and other attacks and bring you up to speed while sipping piña coladas by the pool.
A former security reporter for the Washington Post, Brian Krebs knows a thing or two about the cyber world. In this post, he details the security threat of losing a traffic-generating website domain and explains how hackers use these websites to steal credit card data and other information.
The well-known website ZDnet brings technology news of different kinds, very much including security-focused. In this article, reporter Catalin Cimpanu talks about the new eCommerce platforms for Magecart attacks, which include OpenCart, OSCommerce, WooCommerce, Shopify, and others.
This article dives into the results of Willem de Groot’s research, which shows that Magecart attackers manage to infiltrate the same websites over and over again, using new tricks and tactics. This is an all too familiar scenario in the cyber world and it’s important to understand how and why it happens.
If you are currently training new team members and looking for a comprehensive and detailed explanation of Magecart attacks, we highly recommend reading and sharing this article. It features basic and clear definitions and categories, interesting if somewhat alarming data, and more.
As a cybersecurity professional, you must have wished a thousand times that you were a fly on the desktop of Magecart hackers. Well, this article is as close as you’ll probably get. It examines the fascinating world behind virtual enemy lines. We highly recommend downloading the report the article is based on.
One of the questions on security experts’ minds is how many groups, exactly, does the Magecart hacking method include. There are several contradicting reports on this matter, but we like the explanation in this article and hope you will, too. Learn a little about each group and a lot about the combined threat they pose.
There are plenty of Magecart attacks to read about and learn from, but it’s crucial that we prioritize the most recent ones, as they provide new information regarding hackers’ way of work. In this article, you’ll read about one of the latest and most prominent attacks, which is particularly interesting if you’re a sports fan.
Once again, this is a great article for those of you looking to take a deeper look into Magecart attacks, only this time the angle is a bit more technical. The article uses various examples, such as the Newegg.com breach, and links to additional interesting resources.
We cannot stress enough the importance of staying up to date on hacking techniques. This article will help you do that by examining a relatively new advancement in hackers’ operation, which includes using a new POS skimmer that injects an iframe into retailers’ websites. Remember: you cannot protect websites against what you don’t know.
In this case, we recommend not just reading this short post about the data breach notification issued by sports trading company Topps, but actually following the website and its regular breach alerts. If you’ve always wanted to be the first person to know of every security incident, this is your chance.
The article touches on a more specific type of Magecart attacks, Formjacking, and discusses its influence on federal agencies and other public organizations. This is also a great reminder that no one is safe from hacking – not even the FBI.
We love lists, and this one examines the top 10 types of digital attacks in a simple and even entertaining manner. You’ll have to download the eBook to read the full text, but after reading the sneak peek paragraphs you’ll be able to decide if it’s worth it.
This article follows in the footsteps of famous hackers group Wipro and guides readers through the group’s techniques, its latest attacks, and more. This is an efficient way to study a specific hacking method and visit the mind of a hacker while you’re at it.
In a very meta move, this piece of content examines the security breach of another content website, Forbes. The article explains the technical side of the attack and the course of the website’s response, complete with screenshots of the actual malicious script.
Sometimes, we need a reminder that hackers can reach and hurt literally anyone. This article examines the vulnerabilities of financial institutions and shows that most of the major banks are exposed to attacks and must protect themselves from what could end up being devastating damage.
This is yet another detailed description of a Magecart attack, including code screenshots and an overview of attacks that resemble this course of action. We invite you to read this article, but if the attack over two bedding retailers keeps you up at night, appreciate the irony and don’t blame us.
For the attack described in this article, hackers used the Google Analytics tool and inserted a fake piece of code to steal financial data. This is a word of warning for those who use this common tool without taking the necessary precautions and think that Google will take care of everything.
The content of this article is a bit challenging, as it examines a Magecart attack without having all the relevant information. Still, it’s inspiring to see how security reporters make the educated assumption regarding the attackers’ identity, despite the fact that the clothing company itself refused to provide any specific details.
The final article on our list is focused on the infamous credit card skimmer that became that much more sophisticated and threatening. The article explains the current advancements that make this skimmer a more powerful hacking tool and provide helpful information for those trying to protect themselves from it.
Just like the hacker hunt, the resources and information on cybersecurity never end. You couldn’t possibly read every new article as it gets published, but you do need to stay on your toes somehow. We hope that this list will keep you informed and captivated by the challenging professional field you’ve chosen, and invite you to visit our blog and learn even more. Enjoy your reading!