Tag

Network Security

Covers strategies, tools, and best practices for protecting computer networks from unauthorized access, cyberattacks, and data breaches. Topics include firewalls, intrusion detection systems, network segmentation, and monitoring techniques that help organizations maintain secure and resilient infrastructure.

posts

Man in the Middle Attack

Man in the Middle Attack: How Hackers Steal Data

In 2015, a Belgian company called Crelan Bank lost over €70 million to a sophisticated fraud scheme that began with attackers intercepting email communications between executives. The threat actors positioned themselves between two parties, manipulated invoices, and redirected payments — all without either side realizing the conversation had been compromised. That&

Carl B. Johnson May 08, 2020 7 min read
DNS Spoofing

DNS Spoofing Attack: How It Works and How to Stop It

In April 2022, researchers at Avast discovered that the GhostDNS botnet had compromised over 100,000 home routers across Brazil — silently redirecting banking customers to pixel-perfect phishing pages. Victims typed their real bank URLs into their browsers. The addresses looked correct. But every keystroke landed on a threat actor'

Carl B. Johnson Apr 07, 2020 8 min read
Spoofing

Spoofing Attacks: How Hackers Impersonate You Online

In 2023, a finance employee at the multinational firm Arup wired $25 million to threat actors after a deepfake video call that spoofed the company's CFO and several colleagues. Every face on the screen was fake. Every voice was synthesized. The employee had no reason to doubt what

Carl B. Johnson Feb 27, 2020 7 min read
Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In May 2021, a single compromised VPN password shut down the largest fuel pipeline in the United States. The Colonial Pipeline attack didn't start with some exotic zero-day exploit. It started with a stolen credential. That's the reality of how ransomware spreads — and it's

Carl B. Johnson Nov 30, 2019 6 min read
Zero Trust Security Model

Zero Trust Security Model: A Practical Guide for 2026

The Breach That Proved Perimeters Don't Work In 2020, the SolarWinds breach gave roughly 18,000 organizations a brutal lesson: once a threat actor gets past your perimeter, they can move laterally for months without detection. Government agencies, Fortune 500 companies, and critical infrastructure providers all had firewalls.

Carl B. Johnson Oct 01, 2019 7 min read
Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2026

The Breach That Proved Perimeter Security Was Dead In early 2024, a threat actor gained access to Microsoft's corporate email system — including accounts belonging to senior leadership and cybersecurity staff. The attacker didn't exploit some exotic zero-day. They used a password spray attack against a legacy

Carl B. Johnson Sep 28, 2019 8 min read
Zero Trust Implementation

Zero Trust Implementation: A Practical Guide for 2026

The Breach That Proved "Trust But Verify" Is Dead In early 2024, a major healthcare provider disclosed that attackers had spent nine months inside their network — moving laterally, escalating privileges, and exfiltrating millions of patient records. Their perimeter defenses were solid. Their VPN was enterprise-grade. None of it

Carl B. Johnson Sep 28, 2019 7 min read
VPN Best Practices

VPN Best Practices: What Actually Protects You in 2026

The Ivanti Breach Changed How I Think About VPNs In early 2024, CISA issued an emergency directive after threat actors exploited vulnerabilities in Ivanti Connect Secure VPN appliances to infiltrate multiple federal agencies. The attackers didn't brute-force passwords. They didn't trick users with phishing emails. They

Carl B. Johnson Sep 28, 2019 7 min read
Remote Desktop Security Risks

Remote Desktop Security Risks: What Attackers See

In 2023, the FBI's Internet Crime Complaint Center flagged Remote Desktop Protocol (RDP) as one of the top three initial access vectors for ransomware incidents. That wasn't a surprise to anyone who monitors Shodan — the search engine that indexes internet-facing devices. On any given day, you

Carl B. Johnson Sep 20, 2019 6 min read
DNS Spoofing

DNS Spoofing Attack: How Hackers Redirect Your Traffic

Your Employees Think They're on Your Bank's Website. They're Not. In April 2022, researchers at Avast documented a campaign where threat actors compromised home routers to execute a DNS spoofing attack that redirected users trying to visit legitimate banking sites to near-perfect credential theft

Carl B. Johnson Jul 14, 2019 6 min read