Tag "DDOS"

Back to homepage
Hardware/Network

How accepting that your network will get hacked will help you develop a plan to recover faster

As anyone in the network security world will tell you, it is an extremely intense and stressful job to protect the corporate network from ever-evolving security threats. For a security

Cloud

Four Cloud Security Predictions For 2019

The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While

Expert Articles

Risky Business: Enterprises Play Roulette with IoT Devices

By Chris Rouland Co- founder and Chief executive officer at Phosphorus Cybersecurity, Enterprises today are putting themselves at risk by allowing vulnerable IoT devices into their businesses. How many lightbulbs does it take to bring down an enterprise? If it’s a smart lightbulb: only one.In what seemingly appears to be a quest for complete connectivity, enterprises are turning a blind

Hardware/Network

FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged

The U.S. Justice Department announced earlier today that the FBI has seized domains of 15 “DDoS-for-hire” websites and charged three individuals running some of these services. DDoS-for-hire, or “Booter” or

Expert Articles

Threat-Actor Opportunism at Peak During Holiday Season

By Mike Mimoso, Editorial Director at Flashpoint, Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, businesses must be aware of the

Industry Insights

Securing industrial control systems by closing the air gap security loophole

Air-gapping is one of the most common ways ICS are protected, however, organisations’ interpretation of how to isolate networks often varies.Security and industry experts have long advocated for the need

Hardware/Network

Mirai Used as Payload in Hadoop YARN Vulnerability

A Mirai variant has been discovered targeting unpatched Linux servers, shifting the use of the malicious payload beyond the internet of things (IoT), according to new research from NETSCOUT ASERT.

IT Compliance

The Godfather Part 4 – Cybercrime Isn’t Personal, It’s Strictly Business

When many of us hear the term ‘Mafia’, we conjure up the thought of ’wise guys’ of the 1920’s and 30s in pinstripe suits, personified by Al Capone or those

Hardware/Network

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that

IT Compliance

A law enforcement view of emerging cybercrime threats

Cybercriminals are adopting creative new techniques to target their victims at an unprecedented pace and are constantly seeking methods to avoid law enforcement detection. To stay ahead of them, law