<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;"><span style="background-color: transparent;"><a href="https://bit.ly/2yqYZZb" rel="noopener" target="_blank">Apple's</a> top security employee told Congress on Monday that it has not found anything to suggest that its systems were compromised through a sophisticated breach of its supply chain.</span></p> <!--more--><p style="text-align: center;"><strong>Our Breakdown</strong></p> <ul> <li>Hardware modification is a possibility in the growing list of supply chains attacks directed at businesses and government agencies. (Though in this case it doesn’t seem like it’s the case) If the hardware is modified, you can’t trust anything the system itself tells you, so host-based tools may not be able to detect such incidents.</li> <li>In such cases, network monitoring still works and isn’t impacted by such techniques so it is still possible to detect such breaches.</li> <li>This specific case, if there are known indicators of compromise, those can be put into DNS servers or firewalls to detect and block such attacks.</li> <li>Even without direct intelligence, statistical monitoring of network activity and machine learning to detect suspect infrastructure can identify otherwise unknown attackers using such attacks.</li> </ul> <p style="text-align: center;">Interesting in learning more about ThreatSTOP? Check us out at <a href="http://www.threatstop.com">www.threatstop.com</a>.</p></span>