A British man who pleaded guilty to selling homemade distributed denial-of-service attack tools reportedly used to carry out more than 600,000 attacks has escaped jail time, with a judge calling him "young and naïve."
While nations around the world are considered C2 traffic offenders,
the regions generating the highest levels of traffic are Europe and the United
States. An average of 20 percent of the tracked C2s were based in North America
with a nearly equal amount launching from the Ukraine and Russia combined. Unusual...
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
In the following whitepaper, you will learn about:
Onion-layered security incidents on the rise
The year of ransomware
Malicious insiders on the...
As DDoS attacks become more sophisticated, organizations must include prevention components in their overall security infrastructure, rather than just their network infrastructure, JP Blaho of Arbor Networks says in this video interview.
DDoS as an extortion tactic continues to reinvent itself, and has replaced hacktavism as the leading driver of DDoS attacks during 2015. Whether shifting its target demographics from Bitcoin exchanges or more traditionally known financial services institutions, using DDoS tactics has never been easier, cheaper or more...
The Justice Department has unsealed indictments against seven Iranians, allegedly working on behalf of the Iranian government, who are suspected of conducting DDoS attacks against dozens of American banks and attempting to seize control of Bowman Dam outside New York City.
Even though the pass-the-hash (PtH) attack was originally
published 1997, these types of attacks
have recently come to the forefront again. Given this reality,
organizations need advanced solutions that can help protect
them.
Download this whitepaper to help your company mitigate these risks by:
Defining...
Credit card and other personal information was exposed in a data breach of Internet hosting provider Staminus Communications, which specializes in protection against distributed denial-of-service attacks. The company hosts the website of the Ku Klux Klan white supremacist group, which was also brought down.
DDoS attacks are on the rise, and they come across multiple vectors. In this video interview, Paul Nicholson of A10 Networks describes how organizations can defend against DDoS - and why SSL traffic inspection is a must.
Cyber-extortion attacks, especially those involving DDoS gangs that threaten disruptions unless the targeted organization pays a bitcoin ransom, are on the rise. Experts describe how organizations should respond to - and resist - these attacks.
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Q2 2015 was dominated by attacks launched by DD4BC, the same malicious group responsible for several Bitcoin extortion campaigns in
2014. DD4BC expanded its extortion and DDoS campaigns during April and May 2015, where over the course of one week, several customers received ransom emails in which the group warned...
WordPress, with it's ever-growing popularity, is an attractive target for attackers. Many of its security issues come from third-party plugins and themes. Getting these listed on WordPress.org
requires approval and must adhere to a
strict list of guidelines. After this initial approval, however, future changes...
Choosing the right MSSP partner is an important decision in an organization's overall security. Writing an RFP is the first step in the process to finding the right fit for the organization. By using this document, an organization should be able to choose an MSSP and write a tailored RFP/RFI that will help make the...
In 2015, there were nine common web application attack vectors. They
represent a cross section of many of the most common categories seen in industry
vulnerability lists. The goal of this report is not to validate any one of the vulnerability
lists, but instead to look at some of the characteristics of these...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.