The latest edition of the ISMG Security Report features a summary of alarming new findings about the ability of the U.S. to counter a nation-state malware attack. Plus, a discussion of "fusion centers" at banks and an update on the targeting of Webstresser subscribers.
Network security professionals are responsible for using the lessons learned from previous experiences to build controls that will protect systems in the future. This can be an easy process, but it's often complicated by the daily tasks needed to make an enterprise run.
To ensure you stay up to speed, download the...
The number of attacks over 10Gbps have doubled, while the duration of attacks continues to decrease
The Internet-connected world continues to grow more complex, due to faster connections, the widespread adoption of Internet of Things (IoT) devices, and the use of cloud services. At the same time, Distributed Denial...
With the explosion of poorly secured IoT devices being regularly herded into larger and larger botnets, it's hardly a surprise that DDoS attacks are now so common and damaging. What is surprising, is that many companies still lack adequate protection against these attacks, especially in an era when Internet...
A U.K. court has sentenced Daniel Kaye, 30, after he admitted launching DDoS attacks against Liberia's largest telecommunications company in 2015 and 2016. A rival internet services provider paid Kaye $100,000 to launch the attacks.
Payments company CashFlows delivers all its offerings - including
its latest generation of products in the cardholder-present space
- via the cloud, it cannot afford attacks that make its service
unavailable.
Knowing that DDoS threats aren't going away, CashFlows wanted to
find a reliable,...
To combat cyberattacks, more nations must not only hold nation-state attackers accountable, but also better cooperate by backing each other's attribution, said Estonian politician Marina Kaljurand, who chairs the Global Commission on the Stability of Cyberspace, in her opening keynote speech at Black Hat Europe 2018.
There is no shortage of security tools in any large government IT environment that are targeting specific cyber threats for a specific outcome. Yet, most agencies lack an always-on, in-line capability that allows them to operationalize their cyber threat intelligence programs. Blocking suspicious connections to...
A Field Guide to Understanding IoT Attacks from the Mirai Botnet to Its Modern Variants
The infamous Mirai IoT botnet was responsible for some of the largest and most distributive DDoS attacks in recent history. Commanding hundreds of thousands of IoT devices, it sent shock waves through the security marketplace...
Financial services have historically been at the forefront of adapting to changes in technology, regulations and consumer behavior. While businesses focus on the challenges of customer experience, digital transformation and cloud adoption, the industry is dealing with increased risks posed by operational challenges...
Are you sure you're adequately protected from the modern-day DDoS attack? This session will discuss findings from NETSCOUT Arbor's August 2018 Global Threat Intelligence Report which shows that DDoS attacks are not only increasing in frequency and complexity, but they are also routinely being used by hactivists,...
HSBC Bank is warning some of its U.S. customers that their personal data was compromised in a breach, although it says it's detected no signs of fraud following the "unauthorized entry." Security experts say the heist has all the hallmarks of a credential-stuffing attack campaign.
Not only are we now seeing the most powerful DDoS attacks ever recorded, but they also are leveraging the ever-growing army of IoT devices. Gary Sockrider of NETSCOUT Arbor offers advice for detection and defense.
DDoS attacks have increased significantly in scale via IoT botnet attacks. Gary Sockrider of Netscout Arbor discusses best practices for dealing with this significant threat.
A federal jury has convicted a hacktivist who launched DDoS attacks in 2014 on Boston Children's Hospital and another local facility to protest a controversial child custody case.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.