Docs, Island: Replace broken links with wayback machine links

These needs to be changed when we have live ones from Akamai.
This commit is contained in:
Ilija Lazoroski 2022-08-10 14:34:13 +02:00
parent 53c2a1d5c4
commit 4da0b5fcff
3 changed files with 4 additions and 4 deletions

View File

@ -9,7 +9,7 @@ weight: 5
## Overview ## Overview
Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak, Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak,
which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://www.guardicore.com/2019/04/iresponse-to-iencrypt/). which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://web.archive.org/web/20210117224801/https://www.guardicore.com/2019/04/iresponse-to-iencrypt/).
The Infection Monkey can help you assess the impact of stolen credentials by automatically searching The Infection Monkey can help you assess the impact of stolen credentials by automatically searching
where bad actors can reuse these credentials in your network. where bad actors can reuse these credentials in your network.

View File

@ -8,8 +8,8 @@ weight: 3
## Overview ## Overview
From the [Hex-Men campaign](https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit From the [Hex-Men campaign](https://web.archive.org/web/20210115171355/https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit
internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign attackers are now trying to go deeper into your network. internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://web.archive.org/web/20210115185135/https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign attackers are now trying to go deeper into your network.
Infection Monkey will help you assess the impact of a future breach by attempting to propagate within your internal network using service vulnerabilities, brute-forcing and other safe exploiters. Infection Monkey will help you assess the impact of a future breach by attempting to propagate within your internal network using service vulnerabilities, brute-forcing and other safe exploiters.

View File

@ -14,7 +14,7 @@ const ATTACK_DESCRIPTION = <>
<br /> <br />
<br /> <br />
<ExternalLink <ExternalLink
url="https://www.guardicore.com/blog/what-are-ransomware-costs/?utm_medium=monkey-request&utm_source=web-report&utm_campaign=monkey-security-report" url="https://web.archive.org/web/20210510221915/https://www.guardicore.com/blog/what-are-ransomware-costs/"
text="Learn about the financial impact of ransomware on Guardicore's blog" text="Learn about the financial impact of ransomware on Guardicore's blog"
/> />
</> </>