Tag Archives: advanceddisplay

Spamhaus Intelligence API: Free threat intelligence data for security developers

Spamhaus Technology releases its Intelligence API. This is the first time Spamhaus has released its extensive threat intelligence via API, providing enriched data relating to IP addresses exhibiting compromised behaviour. Available free of charge, developers can readily access enhanced data that catalogues IP addresses compromised by malware, worms, Trojan infections, devices controlled by botnets, and third party exploits, such as open proxies. The API features live and historical data, including bot names, first seen dates, … More ? The post Spamhaus Intelligence API: Free threat intelligence data for security developers appeared first on Help Net Security .

See the original article here:
Spamhaus Intelligence API: Free threat intelligence data for security developers

Cyber insurance claims on the rise

External attacks on companies result in the most expensive cyber insurance losses, but it is employee mistakes and technical problems that are the most frequent generator of claims by number, according to a report from Allianz Global Corporate & Specialty (AGCS). The study analyzes 1,736 cyber-related insurance claims worth EUR 660mn (US$ 770mn) involving AGCS and other insurers from 2015 to 2020. “Losses from incidents such as distributed denial of service (DDoS) attacks or phishing … More ? The post Cyber insurance claims on the rise appeared first on Help Net Security .

Read More:
Cyber insurance claims on the rise

Week in review: Criminals leveraging Office 365, endpoint attack anatomy, medical devices cybersec

Here’s an overview of some of last week’s most interesting news, reviews and articles: Critical flaw in SonicWall’s firewalls patched, update quickly! (CVE-2020-5135) SonicWall patched 11 vulnerabilities affecting its Network Security Appliance (NSA). Among those is CVE-2020-5135, a critical stack-based buffer overflow vulnerability in the appliances’ VPN Portal that could be exploited to cause denial of service and possibly remote code execution. The anatomy of an endpoint attack A lot has changed across the cybersecurity … More ? The post Week in review: Criminals leveraging Office 365, endpoint attack anatomy, medical devices cybersec appeared first on Help Net Security .

Read the original post:
Week in review: Criminals leveraging Office 365, endpoint attack anatomy, medical devices cybersec

Microsoft and partners cut off key Trickbot botnet infrastructure

Two weeks after someone (allegedly the US Cyber Command) temporarily interrupted the operation of the infamous Trickbot botnet, a coalition of tech companies headed by Microsoft has struck a serious blow against its operators. “We disrupted Trickbot through a court order we obtained as well as technical action we executed in partnership with telecommunications providers around the world. We have now cut off key infrastructure so those operating Trickbot will no longer be able to … More ? The post Microsoft and partners cut off key Trickbot botnet infrastructure appeared first on Help Net Security .

Continue Reading:
Microsoft and partners cut off key Trickbot botnet infrastructure

DDoS attacks rise in intensity, sophistication and volume

There have been significant shifts in DDoS attack patterns in the first half of 2020, a Neustar report reveals. There has been a 151% increase in the number of DDoS attacks compared to the same period in 2019. These included the largest and longest attacks that Neustar has ever mitigated at 1.17 Terabits-per-second (Tbps) and 5 days and 18 hours respectively. These figures are representative of the growing number, volume and intensity of network-type cyberattacks … More ? The post DDoS attacks rise in intensity, sophistication and volume appeared first on Help Net Security .

View article:
DDoS attacks rise in intensity, sophistication and volume

New attack vectors make securing virtual companies even more challenging

As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers—and new challenges for network administrators have been introduced, Nuspire reveals. Now six months into the pandemic, attackers pivoted away from COVID-19 themes, instead utilizing other prominent media themes like the upcoming U.S. election to wreak havoc. Increase in both botnet and exploit activity There was an increase in both botnet and exploit activity over the course of Q2 2020 by 29% … More ? The post New attack vectors make securing virtual companies even more challenging appeared first on Help Net Security .

Continued here:
New attack vectors make securing virtual companies even more challenging

Fileless worm builds cryptomining, backdoor-planting P2P botnet

A fileless worm dubbed FritzFrog has been found roping Linux devices running SSH servers – corporate servers, routers and IoT devices – into a P2P botnet whose apparent goal is to mine cryptocurrency. Simultaneously, though, the malware creates a backdoor on the infected machines, allowing attackers to access it at a later date even if the SSH password has been changed in the meantime. “When looking at the amount of code dedicated to the miner, … More ? The post Fileless worm builds cryptomining, backdoor-planting P2P botnet appeared first on Help Net Security .

More:
Fileless worm builds cryptomining, backdoor-planting P2P botnet

New defense method enables telecoms, ISPs to protect consumer IoT devices

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National University of Singapore (NUS) researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices. An overview of the key steps in the proposed method According to their new study, the ability to launch massive DDoS attacks via a botnet of compromised devices is … More ? The post New defense method enables telecoms, ISPs to protect consumer IoT devices appeared first on Help Net Security .

Visit site:
New defense method enables telecoms, ISPs to protect consumer IoT devices

In addition to traditional DDoS attacks, researchers see various abnormal traffic patterns

In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019, and more than 542% compared to the last quarter, as published in the Nexusguard Q1 2020 Threat Report. DDoS attacks have become a global risk, and as attacks continue to increase in complexity, further spurred by the pandemic, ISPs will have to strengthen their security measures. Undetectable and abnormal traffic patternss While DDoS attacks disrupt service for large companies … More ? The post In addition to traditional DDoS attacks, researchers see various abnormal traffic patterns appeared first on Help Net Security .

Read More:
In addition to traditional DDoS attacks, researchers see various abnormal traffic patterns

Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications

Here’s an overview of some of last week’s most interesting news and articles: New wave of attacks aiming to rope home routers into IoT botnets A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. High-profile Twitter accounts hijacked to push Bitcoin scam. How did it happen? The Twittersphere went into overdrive as a bunch of prominent, verified Twitter accounts … More ? The post Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications appeared first on Help Net Security .

Continue Reading:
Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications