Author Archives: Enurrendy

Razer to fix Windows installer that grants admin powers if you plug in a mouse

Plus: Cloudflare tackles huge DDoS attack, Apple and CSAM, and more In brief   Razer is working on an updated installer after it was discovered you can gain admin privileges on Windows by plugging in one of the gaming gear maker’s mice or keyboards.…

Taken from:
Razer to fix Windows installer that grants admin powers if you plug in a mouse

Razer ponders how to fix installer that grants admin powers if you plug in a mouse

Plus: Cloudflare tackles huge DDoS attack, Apple and CSAM, and more In brief   Razer is said to be working on an updated installer after it was discovered you can gain admin privileges on Windows by plugging in one of the gaming gear maker’s mice or keyboards.…

More:
Razer ponders how to fix installer that grants admin powers if you plug in a mouse

Splunk spots malware targeting Windows Server on AWS to mine Monero

RDP-enabled instances attacked, perhaps via Iran and China, then use Telegram desktop client for command and control Data analysis firm Splunk says it’s found a resurgence of the Crypto botnet – malware that attacks virtual servers running Windows Server inside Amazon Web Services.…

More:
Splunk spots malware targeting Windows Server on AWS to mine Monero

ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs

ThreatX announced new API Catalog capabilities to provide enterprises with a clear view of their API’s attack surface, as well as the operational health of APIs in production. ThreatX supports DevOps and Security teams by assessing traffic in real-time to reduce risk and protect critical APIs from misconfiguration, DDoS, BOT attacks and malicious use. APIs are under constant assault by sophisticated attackers. Any downtime or data loss experienced as a result of an API attack … More ? The post ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs appeared first on Help Net Security .

Read this article:
ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs

Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types. Notable takeaways On average, a company had to detect and block nearly 5,000 malicious events and a volume of 2.3TB per month during the second quarter of 2021. During the second quarter of 2021, … More ? The post Blocked DDoS attack volumes up, tech, healthcare and finance most targeted appeared first on Help Net Security .

Read the article:
Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Corero Network Security expands DDoS protection portfolio with ETD capability

Corero Network Security announces additional flexibility when deploying its SmartWall solution, with a new Edge Threat Defense (ETD) capability. Corero’s mission is to make the internet a safer and more reliable place to do business by protecting against the downtime and disruption caused by DDoS attacks. Corero enables organizations around the globe to maintain business continuity in the event of a DDoS attack, by deploying the award-winning and intelligently automated SmartWall DDoS protection solution that … More ? The post Corero Network Security expands DDoS protection portfolio with ETD capability appeared first on Help Net Security .

View original post here:
Corero Network Security expands DDoS protection portfolio with ETD capability

Week in review: HiveNightmare on Windows 10, Kaseya obtains REvil decryptor

Here’s an overview of some of last week’s most interesting news and articles: Kaseya obtains universal REvil decryptor There’s finally some good news for the MSPs and their customers that have been hit by the REvil ransomware gang via compromised Kaseya VSA software: a universal decryptor has made it available to affected organizations. DDoS attacks are up, with ever-greater network impact With an overall rise in available network capacity, cyber criminals are increasingly targeting their … More ? The post Week in review: HiveNightmare on Windows 10, Kaseya obtains REvil decryptor appeared first on Help Net Security .

Continue reading here:
Week in review: HiveNightmare on Windows 10, Kaseya obtains REvil decryptor

DDoS attacks are up, with ever-greater network impact

Telia Carrier has announced the findings of a report with a perspective on today’s cyber threats from traffic data. The report investigates changes in attack vector, size and frequency, and reveals a staggering 50% increase in peak attack traffic compared to 2019, with a jump to 1.18 Terabytes per Second (TBps) or 887 Mega Packets Per Second (Mpps). In 2020, a staggering 57 Petabits or 14 tera packets of malicious data have been cleaned. During … More ? The post DDoS attacks are up, with ever-greater network impact appeared first on Help Net Security .

Link:
DDoS attacks are up, with ever-greater network impact

DDoS attacks increased 33% in H1 2021

There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of attacks compared to the same period last year. The report also found that between Q1 2021 and Q2 2021 there was a 19% increase in DDoS campaigns, some of which were over 100 Gbps in attack volume; further evidence that hackers are continuing to … More ? The post DDoS attacks increased 33% in H1 2021 appeared first on Help Net Security .

Read the original:
DDoS attacks increased 33% in H1 2021

Link11 Discovers Record Number of DDoS Attacks in First Half of 2021

In H1 2021, cyber criminals targeted businesses in record numbers as they continued to exploit vulnerabilities caused by the pandemic A report published by Link11, Europe’s leading IT security provider in cyber resilience, suggests there has been a 33% increase in the number of DDoS attacks in H1 2021. Between January and June, the Link11 Security Operations Centre (LSOC) recorded record numbers of attacks compared to the same period last year. The report also found that between Q1 2021 and Q2 2021 there was a 19% increase in DDoS campaigns, some of which were over 100 Gbps in attack volume; further evidence that cyber criminals are continuing to exploit the vulnerabilities of businesses during the pandemic. The key findings from the report are: The number of attacks continued to rise: + 33% increase year-on-year compared to H1/2020. DDoS attacks are increasing: +19% in Q2 2021 compared to Q1 2021. Overall attack bandwidth remained high: 555 Gbps in maximum attack volume. Sharp increase in attack bandwidth: +37% increase in H1/2021 compared to H1/2020. Number of high-volume attacks > 100 Gbps in H1/2021: 28 Criminals targeted those organisations and institutions that were in high demand during the global pandemic, such as va ccination websites, e-learning platforms or portals and businesses IT infrastructure as well as hosting providers and internet service providers . LSOC also suggests that the use of extortion emails has reached critical levels . Employees have received malicious emails from a multitude of different senders including Fancy Bear, Lazarus Group and most recently Fancy Lazarus. Instead of being indiscriminate, ransom demands now vary depending on the size of the company and the industry of the victims. In fact, companies from a wide range of industries (including finance, e-commerce, media and logistics) are currently being affected. The frequency of these campaigns has increased, ransom demands have skyrocketed and LSOC is warning that they could continue well into Q3 2021. According to Link11’s security experts, the intensity and regularity of extortion emails has noticeably increased . The scale of DDoS activity far exceeds any from previous years and the number of businesses experiencing serious security breaches has risen sharply. The consequences of such an attack can be severe, from loss of revenue, costly business interruptions, long recovery times to sensitive data being compromised. Marc Wilczek, Managing Director of Link11, said: “In an increasingly connected world, the availability and integrity of IT systems are critical to any business. Our research for the first half of 2021 shows that companies are continuously exposed to DDoS attacks and that they are far more frequent and complex. Due to the increasingly sophisticated attack techniques being used by cyber criminals, many security tools are reaching their limits. This means that solutions which provide maximum precision and speed in detecting and mitigating the attacks are more in demand than ever before.” Although the threat level of DDoS attacks has remained high and security providers have provided persistent warnings, LSOC believes some companies are still lack the relevant security solutions to prevent an attack . In a number of cases, organisations have been found to be completely unprotected and operations have been brought to a standstill. The only way to limit the damage is to implement specialised protection solutions on an ad-hoc basis. From an economic and legal point of view, however, it makes more sense to focus on sustainable prevention rather than reaction. As threat levels continue to rise LSOC recommends businesses take this opportunity to conduct a thorough review of their cyber security posture. They are also warning if you fall victim to a DDoS attack do not respond to extortion attempts and call in a specialist for DDoS protection as soon as an attack has been detected. Source: https://www.link11.com/en/blog/threat-landscape/link11-report-discovers-record-number-of-ddos-attacks-in-first-half-of-2021/

Originally posted here:
Link11 Discovers Record Number of DDoS Attacks in First Half of 2021