Tag Archives: ddos

Switzerland under cyberattack

Swiss government websites are under DDoS attacks, but several ransomware gangs have also turned their sights on Swiss government organizations, cantonal governments, cities and companies in the last few months. Government sites under DDoS attacks “Several Federal Administration websites are/were inaccessible on Monday 12 June 2023, due to a DDoS attack on its systems,” the Swiss National Cyber Security Centre (NCSC) said on Monday. “The Swiss government’s portal www.admin.ch remains accessible.” But the attackers did … More ? The post Switzerland under cyberattack appeared first on Help Net Security .

Taken from:
Switzerland under cyberattack

The evolution of DDoS attacks in 2023

In this Help Net Security video, Mattias Fridström, Chief Evangelist at Arelion, talks about the DDoS threat landscape during 2023. DDoS attacks reflect significant geo-political challenges and social tensions and have become an increasingly important part of the hybrid warfare arsenal. In 2022, peak attack traffic in Mega Packets Per Second (Mpps) was up 19% from 2021. This trend reflects overall Internet traffic growth but is also due to a continuing shift towards fewer but … More ? The post The evolution of DDoS attacks in 2023 appeared first on Help Net Security .

See the article here:
The evolution of DDoS attacks in 2023

9 free cybersecurity whitepapers you should read

In today’s rapidly evolving digital landscape, organizations face constant cyber threats that can compromise their sensitive data, disrupt operations, and damage their reputation. Staying informed about the latest cyberattacks and understanding effective protection methods is crucial. This list of free cybersecurity whitepapers that don’t require registration covers a wide range of common cyber risks (ransomware, DDoS attacks, social network account hijacking). It explores the possible risks that could originate from new technologies such as generative … More ? The post 9 free cybersecurity whitepapers you should read appeared first on Help Net Security .

More:
9 free cybersecurity whitepapers you should read

NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks

NETSCOUT has introduced Arbor Sightline Mobile and MobileStream to answer mobile network operators’ (MNO) need for scalable, real-time visibility, detection, and mitigation of threats that can impact the performance and availability of 4G/5G mobile consumer services and network infrastructure. NETSCOUT continues to expand its Visibility Without Borders platform by combining its mobile network telemetry capabilities with its DDoS protection technology to provide MNOs with a solution to identify and eliminate malicious traffic before it impacts … More ? The post NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks appeared first on Help Net Security .

Originally posted here:
NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks

FYI: Intel BootGuard OEM private keys leak from MSI cyber heist

Plus: Court-ordered domain seizures of DDoS-for-hire sites Intel is investigating reports that BootGuard private keys, used to protect PCs from hidden malware, were leaked when data belonging to Micro-Star International (MSI) was stolen and dumped online. …

Continue Reading:
FYI: Intel BootGuard OEM private keys leak from MSI cyber heist

ThreatX strengthens API and application protection with Botnet Console and API Catalog 2.0

ThreatX announced the expansion of its platform offering with the release of a new Botnet Console and API catalog 2.0. These new dashboards, unveiled at RSA Conference 2023, will help security teams rapidly investigate automated threats and attempts to abuse APIs with enhanced metrics, analytics, and visualizations. Attackers use botnets and other advanced techniques to exploit APIs and applications and evade detection thanks in part to solver services that are sold on the dark web. … More ? The post ThreatX strengthens API and application protection with Botnet Console and API Catalog 2.0 appeared first on Help Net Security .

Read the original:
ThreatX strengthens API and application protection with Botnet Console and API Catalog 2.0

Akamai Prolexic Network Cloud Firewall defends organizations against DDoS attacks

Akamai launched Prolexic Network Cloud Firewall, allowing customers to define and manage their own access control lists (ACLs) while enabling greater flexibility to secure their own network edge. Prolexic is Akamai’s cloud-based DDoS protection platform that stops attacks before they reach applications, data centers and internet-facing infrastructure. DDoS threats are on the rise again, a trend that is being accelerated by the growing number of businesses and organizations that rely on online services to operate. … More ? The post Akamai Prolexic Network Cloud Firewall defends organizations against DDoS attacks appeared first on Help Net Security .

Continue reading here:
Akamai Prolexic Network Cloud Firewall defends organizations against DDoS attacks

DDoS DNS attacks are old-school, unsophisticated … and they’re back

So why would you handle them on your own? Sponsored Feature   Ransomware may currently be the biggest bogeyman for cybersecurity pros, law enforcement, and governments, but it shouldn’t divert us from more traditional, but still very disruptive threats.…

Read the original post:
DDoS DNS attacks are old-school, unsophisticated … and they’re back

Critical infrastructure gear is full of flaws, but hey, at least it’s certified

Security researchers find bugs, big and small, in every industrial box probed Devices used in critical infrastructure are riddled with vulnerabilities that can cause denial of service, allow configuration manipulation, and achieve remote code execution, according to security researchers.…

Visit link:
Critical infrastructure gear is full of flaws, but hey, at least it’s certified

Malicious actors push the limits of attack vectors

The war in Ukraine has seen the emergence of new forms of cyberattacks, and hacktivists became savvier and more emboldened to deface sites, leak information and execute DDoS attacks, according to Trellix. “Q4 saw malicious actors push the limits of attack vectors,” said John Fokker, Head of Threat Intelligence, Trellix Advanced Research Center. “Grey zone conflict and hacktivism have both led to an increase in cyber as statecraft as well as a rise in activity … More ? The post Malicious actors push the limits of attack vectors appeared first on Help Net Security .

See the original article here:
Malicious actors push the limits of attack vectors