Security News

Copy of Chinese Spy Chip Used in Security Training

The following reports from the Chinese spies infiltrated the supply chain of the servers which are assembled by the Supermicro Computers Inc., New York based CYBERGYM has recently launched a latest infrastructure security combat training program.

CYBERGYM said that they have developed the training which could help the organizations prepare for such attacks. While making this training as realistic as possible, the engineers and the white hat hackers at the CYBERGYM has developed a virtual model of the surveillance chip which is identified in the Bloomberg report. This virtual model which can emulate the actual attack scenario, which probably will allow the participants to respond to a real-life chain of events, GYMBERGYM said.

The training is available in the cyber warfare arenas such as the US, Europe, Asia and Australia, the trainings which provides the organization a special strategies which is needed to defend against the complex hardware-based attacks, which for sure requires an advanced forensics analysis.

This training program which will cover multiple layers of forensics, which includes the memory, network, PLC and the operating systems, In order to bold the organizations detection skill set. The training is multi-leveled with the augments and the critical forensics data collection skills sets of the trainees so that they organizations is equipped with the security personnel who can effectively analyze, mitigate and remediate the hardware or infrastructure level attack damages.

“Our program is based on multilayered forensics and is designed to fundamentally enhance both the human and training policy implementation,” said Ofir Hason, CEO of CYBERGYM, in a press release.

“The story, while contested, has nevertheless brought into sharp focus the very real likelihood of organization’s suffering infrastructure infiltration at the hands of hackers. To fight this type of core and complicated attack, organizations need to be able to quickly analyze the events, collect the relevant forensics and work collaboratively with their IT supply chain partners to mitigate and prevent escalation – processes that are benefited greatly by access to hands-on, real-world training scenarios. In this sense, time and performance are crucial.”

Related Articles

Leave a Reply

Back to top button