Tophat Team Blog

Router Vulnerability

Router Vulnerability

Tech Radar reports, 'A vulnerable Wi-Fi router can leave your entire network open to attack.' This shows why customers need to verify their Cyber Security Supply Chain.  

read more
Fake Cisco Switches

Fake Cisco Switches

F-Secure finds Vulnerability in Fake Cisco Switches stressing yet again the importance of Cyber Supply Chain Security?  

read more
CCP Military-Civil Fusion

CCP Military-Civil Fusion

The U.S. Department of State says "Even if the Chinese Communist Party gives assurances about your technology being confined to peaceful uses, you should know there is enormous risk to America's national security."  

read more
RubyGems

RubyGems

" Supply-chain attack hits RubyGems repository with 725 malicious packages," reports ars TECHNICA. RubyGems is used in many programs/applications. Have you verified your cyber supply chain today?  

read more