Author Archives: Enurrendy

How to spot your biggest security threat? Just look out for the humans

If you’re wondering why, here’s a primer Sponsored Post   How would you describe the biggest security threat to your organization? Perhaps you envision a faceless cybercrime syndicate or hostile state. Or a humming botnet, remorselessly probing your systems.…

Continue reading here:
How to spot your biggest security threat? Just look out for the humans

EMEA continues to be a hotspot for malware threats

Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the WatchGuard Threat Lab. Researchers also found that the Emotet botnet came back in a big way, the infamous Log4Shell vulnerability tripled its attack efforts and malicious cryptomining activity increased. Although findings from the Threat Lab’s Q4 2021 report showed ransomware attacks trending down year over year, that all changed … More ? The post EMEA continues to be a hotspot for malware threats appeared first on Help Net Security .

View the original here:
EMEA continues to be a hotspot for malware threats

G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks

G-Core Labs launched a new stand-alone solution to help protect against SYN Flood DDoS attacks. Developed in partnership with Intel, the XDP-based solution removes the need for a dedicated DDoS protection server role. An SYN Flood is a type of DDoS (Denial of Service) attack that is designed to make an online network or system inaccessible by causing a flood of TCP (Transmission Control Protocol) services with the server. This type of attack sends short … More ? The post G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks appeared first on Help Net Security .

Taken from:
G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks

ThreatX API Protection Quick Start Program enables businesses to extend security to their APIs

ThreatX launched its API Protection Quick Start Program, designed to help organizations better protect their APIs by rapidly deploying real-time protection against botnet, DDoS and complex, multi-mode attacks. APIs are a gold mine for attackers because they enable applications to share information and are increasingly used to streamline communication between consumers and business partners. As a result, the adoption of APIs has far outpaced security teams’ ability to protect against threats, leaving the systems they … More ? The post ThreatX API Protection Quick Start Program enables businesses to extend security to their APIs appeared first on Help Net Security .

Taken from:
ThreatX API Protection Quick Start Program enables businesses to extend security to their APIs

International operation takes down Russian RSOCKS botnet

$200 a day buys you 90,000 victims A Russian operated botnet known as RSOCKS has been shut down by the US Department of Justice acting with law enforcement partners in Germany, the Netherlands and the UK. It is believed to have compromised millions of computers and other devices around the globe.…

Read More:
International operation takes down Russian RSOCKS botnet

Cloudflare says it thwarted record-breaking HTTPS DDoS flood

26m requests a second? Not legit traffic, not even Bill Gates doing $1m giveaways could manage that Cloudflare said it this month staved off another record-breaking HTTPS-based distributed denial-of-service attack, this one significantly larger than the previous largest DDoS attack that occurred only two months ago.…

Read the article:
Cloudflare says it thwarted record-breaking HTTPS DDoS flood

Man gets two years in prison for selling 200,000 DDoS hits

Over 2,000 customers with malice on their minds A 33-year-old Illinois man has been sentenced to two years in prison for running websites that paying customers used to launch more than 200,000 distributed denial-of-services (DDoS) attacks.…

Read the original:
Man gets two years in prison for selling 200,000 DDoS hits

Emotet malware gang re-emerges with Chrome-based credit card heistware

Crimeware groups are re-inventing themselves The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.…

View the original here:
Emotet malware gang re-emerges with Chrome-based credit card heistware

Week in review: Macro-less Office documents zero-day bug, FluBot takedown, growing DDoS threats

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers are warning. FluBot takedown: Law enforcement takes control of Android spyware’s infrastructure An international law enforcement operation involving 11 countries has disrupted the spreading of the FluBot Android … More ? The post Week in review: Macro-less Office documents zero-day bug, FluBot takedown, growing DDoS threats appeared first on Help Net Security .

Read More:
Week in review: Macro-less Office documents zero-day bug, FluBot takedown, growing DDoS threats

DDoS attackers continue to innovate, devising new threats and altering attack strategies

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations based on DDoS attacks against Corero customers during 2021. The report highlights that DDoS threats continue to grow in sophistication, size, and frequency. Yet 2021 also reveals changes in attacker behavior since the start of the pandemic including an increase of 297% in the use of OpenVPN reflections as a means of … More ? The post DDoS attackers continue to innovate, devising new threats and altering attack strategies appeared first on Help Net Security .

Visit link:
DDoS attackers continue to innovate, devising new threats and altering attack strategies