<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Apt on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/apt/</link><description>Recent content in Apt on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 12 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/apt/index.xml" rel="self" type="application/rss+xml"/><item><title>Watering Hole Attack: They Compromised the Site You Trust</title><link>https://blog.it-learn.io/posts/2026-04-12-watering-hole-attack-they-compromised-the-site-you-trust/</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-12-watering-hole-attack-they-compromised-the-site-you-trust/</guid><description>&lt;p&gt;In February 2017, a bank&amp;rsquo;s security team was reviewing the JavaScript source code of the Polish Financial Supervision Authority (KNF) website — a regulatory portal they were required to visit regularly. They found something unexpected: an obfuscated JavaScript snippet that fingerprinted visitors and selectively redirected specific targets to an exploit kit landing page. The KNF site had been compromised. The attackers had turned the regulator&amp;rsquo;s own website into a trap for the banks it supervised.&lt;/p&gt;</description></item><item><title>Supply Chain Attack: How SolarWinds Compromised 18,000 Organizations with One Update</title><link>https://blog.it-learn.io/posts/2026-04-08-supply-chain-attack-solarwinds-explained/</link><pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-08-supply-chain-attack-solarwinds-explained/</guid><description>&lt;p&gt;The SolarWinds attack did not begin with a phishing email or a misconfigured firewall. It began inside a build server — the trusted forge where software is assembled, signed, and shipped. By the time 18,000 organizations downloaded the trojaned Orion update in the spring of 2020, the attackers had already achieved something far more dangerous than a network intrusion: they had weaponized trust itself.&lt;/p&gt;
&lt;p&gt;This post dissects the technical mechanics of the SUNBURST backdoor, the Orion build pipeline compromise, DGA-based command and control, and the detection and defense strategies that can limit your exposure to this class of attack.&lt;/p&gt;</description></item></channel></rss>