<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: LANCHANA M</title>
    <description>The latest articles on DEV Community by LANCHANA M (@lanchana_m_0f6d4f5988532c).</description>
    <link>https://dev.to/lanchana_m_0f6d4f5988532c</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3686385%2Ff6a0d6f0-2949-4d30-98b6-347083272737.png</url>
      <title>DEV Community: LANCHANA M</title>
      <link>https://dev.to/lanchana_m_0f6d4f5988532c</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lanchana_m_0f6d4f5988532c"/>
    <language>en</language>
    <item>
      <title>From Phishing Email to Power Outage: A Simple Case Study of the Ukraine Power Grid Attack</title>
      <dc:creator>LANCHANA M</dc:creator>
      <pubDate>Fri, 09 Jan 2026 09:50:53 +0000</pubDate>
      <link>https://dev.to/lanchana_m_0f6d4f5988532c/what-i-learned-from-a-real-cyber-attack-on-a-power-grid-beginner-case-study-blf</link>
      <guid>https://dev.to/lanchana_m_0f6d4f5988532c/what-i-learned-from-a-real-cyber-attack-on-a-power-grid-beginner-case-study-blf</guid>
      <description>&lt;p&gt;As a computer science student/intern, I was asked to study real-world cybersecurity incidents&lt;br&gt;
and understand how cyber attacks affect critical infrastructure.&lt;/p&gt;

&lt;p&gt;Instead of focusing on theoretical attacks, I wanted to learn how a real cyber incident&lt;br&gt;
happened, how attackers gained access, and what impact it had on people and operations.&lt;/p&gt;

&lt;p&gt;In this post, I explain the 2015 Ukraine power grid cyber attack in very simple terms.&lt;br&gt;
This was the first confirmed cyber attack that successfully shut down a power grid and&lt;br&gt;
showed how even a simple phishing email can cause serious physical disruption.&lt;/p&gt;

&lt;p&gt;The attack occurred on 23 December 2015 in Ukraine. Hackers targeted power distribution&lt;br&gt;
companies and caused electricity outages for around 230,000 people for 1 to 6 hours.&lt;/p&gt;

&lt;p&gt;The attack started with phishing emails sent to employees of power companies.&lt;br&gt;
When employees opened malicious email attachments, malware known as BlackEnergy&lt;br&gt;
was installed on their office computers.&lt;/p&gt;

&lt;p&gt;This malware gave attackers remote access to the company systems, similar to remote desktop.&lt;br&gt;
The attackers did not physically enter the power stations.&lt;/p&gt;

&lt;p&gt;Inside the company network, office computers and SCADA systems were connected.&lt;br&gt;
Because there was no proper network separation, attackers were able to access the SCADA&lt;br&gt;
software used to control substations.&lt;/p&gt;

&lt;p&gt;Using the same SCADA controls as normal operators, attackers remotely switched off&lt;br&gt;
circuit breakers in substations, which resulted in power outages.&lt;/p&gt;

&lt;p&gt;The main losses included power disruption to consumers, operational challenges for&lt;br&gt;
power companies, financial recovery costs, and loss of public trust in critical infrastructure.&lt;/p&gt;

&lt;p&gt;This incident shows that cybersecurity is not only about protecting data.&lt;br&gt;
A simple email-based attack can lead to serious physical and societal impact&lt;br&gt;
when critical systems are not properly secured.&lt;/p&gt;

&lt;p&gt;This post is written for educational and defensive learning purposes only.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>hello</title>
      <dc:creator>LANCHANA M</dc:creator>
      <pubDate>Tue, 30 Dec 2025 16:34:33 +0000</pubDate>
      <link>https://dev.to/lanchana_m_0f6d4f5988532c/hello-4pb2</link>
      <guid>https://dev.to/lanchana_m_0f6d4f5988532c/hello-4pb2</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/shashwathsh" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3683066%2F6da5fa96-6222-4159-a698-375535870738.jpeg" alt="shashwathsh"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/shashwathsh/understanding-beans-in-spring-the-backbone-of-a-spring-application-7ge" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Understanding Beans in Spring: The Backbone of a Spring Application&lt;/h2&gt;
      &lt;h3&gt;Shashwath S H ・ Dec 29&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#backenddevelopment&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#springboot&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#java&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#softwaredevelopment&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>backenddevelopment</category>
      <category>springboot</category>
      <category>java</category>
      <category>softwaredevelopment</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>LANCHANA M</dc:creator>
      <pubDate>Tue, 30 Dec 2025 16:34:06 +0000</pubDate>
      <link>https://dev.to/lanchana_m_0f6d4f5988532c/-4bml</link>
      <guid>https://dev.to/lanchana_m_0f6d4f5988532c/-4bml</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/shashwathsh" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3683066%2F6da5fa96-6222-4159-a698-375535870738.jpeg" alt="shashwathsh"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/shashwathsh/understanding-beans-in-spring-the-backbone-of-a-spring-application-7ge" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Understanding Beans in Spring: The Backbone of a Spring Application&lt;/h2&gt;
      &lt;h3&gt;Shashwath S H ・ Dec 29&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#backenddevelopment&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#springboot&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#java&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#softwaredevelopment&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>backenddevelopment</category>
      <category>springboot</category>
      <category>java</category>
      <category>softwaredevelopment</category>
    </item>
  </channel>
</rss>
