The Twelve Days of Christmas Hacks

December 7

On the first day of Christmas, a hacker sent to me:


Ransomware in my Christmas tree


On the second day of Christmas, a hacker sent to me:

Two trojan horses, and

Ransomware in my Christmas tree


On the third day of Christmas, a hacker sent to me:

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the fourth day of Christmas, a hacker sent to me:

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the fifth day of Christmas, a hacker sent to me:

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the sixth day of Christmas, a hacker sent to me:

Six camera’s watching,

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the seventh day of Christmas, a hacker sent to me:

Seven bots a-breaching,

six camera’s watching,

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the eighth day of Christmas, a hacker sent to me:

Eight firmware’s stealing,

Seven bots a-breaching,

six camera’s watching,

five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the ninth day of Christmas, a hacker sent to me:

Nine nodes a-spying,

Eight firmware’s stealing,

Seven bots a-breaching,

six camera’s watching,

five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the tenth day of Christmas, a hacker sent to me:

Ten botnets phishing

Nine nodes a-spying,

Eight firmware’s stealing,

Seven bots a-breaching,

six camera’s watching,

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the eleventh day of Christmas, a hacker sent to me:

Eleven gadgets spoofing

Ten botnets phishing

Nine nodes a-spying,

Eight firmware’s stealing,

Seven bots a-breaching,

six camera’s watching,

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and

Ransomware in my Christmas tree


On the twelfth day of Christmas, a hacker sent to me:

Twelve routers routing


What! My routers are under attack. That’s it, I’ve had enough!


On the twelfth day of Christmas, I called Cyber Security.

They did risk assessment, pen testing, and fast remediation and got rid of:

Twelve routers routing

Eleven gadgets spoofing

Ten botnets phishing

Nine nodes a-spying,

Eight firmware’s stealing,

Seven bots a-breaching,

six camera’s watching,

Five edge servers DOWN!

Four calling scams,

Three DDOS strikes,

Two trojan horses, and the

Ransomware in my Christmas tree

Johannes Beekman

About the author

Our CEO has more than 25 years of experience in manufacturing in the high-tech industry. Johannes has worked for 25 years in the semiconductor industry, where he worked for Philips, Infineon, and Sematech in various management positions in process development, engineering, operations, and sales and marketing. While working for Philips, he was an engineering manager in 2 wafer fab startups. And while at Sematech, he managed various international technical symposia. He has built 3 successful digital marketing companies in the past 8 years. His focus is marketing integration, marketing technology, SEO, and inbound and outbound marketing. And he has developed a content creation system that uses the AIDA model to develop content for every stage of the sales funnel. Johannes has experience working with companies in manufacturing, the high-tech industry, process industry, IT, healthcare, and legal industry, and he has published on several trade-focused websites.


Tags


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
>