Author Archives: Enurrendy

Castaway hacker guilty of sedating children’s hospital computers

He’ll almost certainly get more than a three-hour tour after DDoS strike on medics A self-styled Anonymous hacker who attempted to flee the US in a sailboat has been convicted of two felonies for his role in a 2014 distributed denial-of-service (DDoS) attack on a children’s hospital.…

Read the original post:
Castaway hacker guilty of sedating children’s hospital computers

ERP applications under attack: How criminals target the crown jewels

Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise in cyberattacks on widely-used enterprise resource planning (ERP) applications such as SAP and Oracle — which currently have a combined 9,000 known security vulnerabilities. The report also highlights an increase in attacks on these systems by nation-state actors, cybercriminals and hacktivists that include both hacking and DDoS attempts to compromise … More ? The post ERP applications under attack: How criminals target the crown jewels appeared first on Help Net Security .

View original post here:
ERP applications under attack: How criminals target the crown jewels

Free training courses on DDoS protection, from introduction to mitigation

The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. If you’re involved in IT security or network operations, you know that DDoS attacks are a problem that’s not going away. Recent studies indicate that almost 75% of organizations have suffered at least one attack over the past 12 months. What’s inside? This comprehensive quiz-based training course, available at both the Basic and Advanced levels, … More ? The post Free training courses on DDoS protection, from introduction to mitigation appeared first on Help Net Security .

Originally posted here:
Free training courses on DDoS protection, from introduction to mitigation

Threat X extends SaaS-Based WAF solution with threat detection

Threat X announced the addition of capabilities to help global customers identify, profile, and intercept a wide range of threats, including DDoS, Bot and zero-day attacks while increasing application performance. Additionally, cloud-native deployment options mean organizations can deploy and scale Threat X in hours—compared to the weeks associated with traditional WAF deployments. Today, security teams are challenged to protect the large attack surfaces presented by complex technology environments from an ever-evolving threat landscape. These teams … More ? The post Threat X extends SaaS-Based WAF solution with threat detection appeared first on Help Net Security .

See more here:
Threat X extends SaaS-Based WAF solution with threat detection

DNS amplification attacks double in Q1 2018

DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. Nexusguard’s scanning and attack Memcached honeypot Nexusguard’s Q1 2018 Threat Report, which analyzes thousands of global cyber attacks, reported that 55 of the attacks were due to exploited Memcached servers. The vulnerable servers pose a significant new risk if not properly configured, similar to exposed servers enabled by DNSSEC, a … More ? The post DNS amplification attacks double in Q1 2018 appeared first on Help Net Security .

Read the original post:
DNS amplification attacks double in Q1 2018

US senators get digging to find out the truth about FCC DDoS attack

And why serial self-promoter John McAfee is a security expert on Russian hacking Senate Democrats are pressing government officials to explain their claims on election tampering and cyberattacks.…

Original post:
US senators get digging to find out the truth about FCC DDoS attack

Protecting consumers from mobile and IoT threats

A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile and Internet of Things continue to be primary attack vectors, contributing to a spike in cryptojacking, adware, and DDoS attacks. The Telco Security Trends Report is based on anonymous data gathered from four communications service providers (CSPs) across Europe and Israel, who between them, protect seven million customers. It found … More ? The post Protecting consumers from mobile and IoT threats appeared first on Help Net Security .

Read More:
Protecting consumers from mobile and IoT threats

E-voting and DDoS concerns: The devil’s in the details

It’s a typical Wednesday. I’m sitting in the lounge at the Imperva office going through emails when I stumble onto a whitepaper titled Trust Implications of DDoS Protection in Online Elections. “That’s an interesting topic,” I think, and dive in. Coincidentally, this whitepaper turns out to be about our own DDoS protection service, which makes it even more interesting. Reading the document, I quickly realize that I don’t agree with several assumptions and interpretations outlined … More ? The post E-voting and DDoS concerns: The devil’s in the details appeared first on Help Net Security .

Read More:
E-voting and DDoS concerns: The devil’s in the details

Pwn goal: Hackers used the username root, password root for botnet control database login

These are not the criminal geniuses you were expecting An IoT botnet has been commandeered by white hats after its controllers used a weak username and password combination for its command-and-control server.…

Originally posted here:
Pwn goal: Hackers used the username root, password root for botnet control database login