Tag Archives: test-if-browser

Threat X extends SaaS-Based WAF solution with threat detection

Threat X announced the addition of capabilities to help global customers identify, profile, and intercept a wide range of threats, including DDoS, Bot and zero-day attacks while increasing application performance. Additionally, cloud-native deployment options mean organizations can deploy and scale Threat X in hours—compared to the weeks associated with traditional WAF deployments. Today, security teams are challenged to protect the large attack surfaces presented by complex technology environments from an ever-evolving threat landscape. These teams … More ? The post Threat X extends SaaS-Based WAF solution with threat detection appeared first on Help Net Security .

See more here:
Threat X extends SaaS-Based WAF solution with threat detection

E-voting and DDoS concerns: The devil’s in the details

It’s a typical Wednesday. I’m sitting in the lounge at the Imperva office going through emails when I stumble onto a whitepaper titled Trust Implications of DDoS Protection in Online Elections. “That’s an interesting topic,” I think, and dive in. Coincidentally, this whitepaper turns out to be about our own DDoS protection service, which makes it even more interesting. Reading the document, I quickly realize that I don’t agree with several assumptions and interpretations outlined … More ? The post E-voting and DDoS concerns: The devil’s in the details appeared first on Help Net Security .

Read More:
E-voting and DDoS concerns: The devil’s in the details

How Mirai spawned the current IoT malware landscape

When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the Mirai malware became instantly known outside the cybersecurity industry. Since then, we’ve come to know the identities of the author of the malware and the botmasters who used it to mount that and other attacks. But, even before the attack against Dyn, they released the malware’s … More ? The post How Mirai spawned the current IoT malware landscape appeared first on Help Net Security .

View article:
How Mirai spawned the current IoT malware landscape

VPNFilter malware compromises over 500,000 networking devices around the world

Cisco Talos researchers have flagged a huge botnet of small and home office routers and NAS devices, capable of collecting communications and data and launching cyber attacks. About the VPNFilter malware The malware that makes it all possible has been dubbed VPNFilter. It’s persistent, modular, and delivered in several stages. The stage 1 malware’s main task is to persist through reboots and to discover the IP address of the current stage 2 deployment server. The … More ? The post VPNFilter malware compromises over 500,000 networking devices around the world appeared first on Help Net Security .

Visit link:
VPNFilter malware compromises over 500,000 networking devices around the world

Dig this: The future of crypto-mining botnets

The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of applications. And as always, cybercriminals are among the earliest adopters, and unfortunately helping to push forward public awareness of the technology. Crypto-mining malware is now by far the most common event we are seeing attacking our user base, and this is only the beginning. Since December 2017, the Coinhive … More ? The post Dig this: The future of crypto-mining botnets appeared first on Help Net Security .

Originally posted here:
Dig this: The future of crypto-mining botnets

Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018

Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2018 coverage Check out what you missed at the infosec event of the year. Real-time detection of consumer IoT devices participating in DDoS attacks Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have presented some encouraging results showing that the first part of … More ? The post Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018 appeared first on Help Net Security .

View article:
Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018

Real-time detection of consumer IoT devices participating in DDoS attacks

Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have presented some encouraging results showing that the first part of that equation can be relatively easily solved. As IoT traffic is often distinct from that of other Internet connected devices and as machine learning has proved promising for identifying malicious Internet traffic, they decided to use these facts to … More ? The post Real-time detection of consumer IoT devices participating in DDoS attacks appeared first on Help Net Security .

Read the original:
Real-time detection of consumer IoT devices participating in DDoS attacks

Do you have what it takes to withstand modern DDoS attacks?

As the latest record DDoS attack hit GitHub and threatened to overwhelm its edge network, the popular Git-repository hosting service quickly switched to routing the attack traffic to their DDoS mitigation service. In the end, GitHub ended up completely unavailable for five minutes and intermittently unavailable for four. But while the effect of the attack could have been worse, GitHub’s engineering team aims to do better next time they are hit. Robert Hamilton, Director of … More ? The post Do you have what it takes to withstand modern DDoS attacks? appeared first on Help Net Security .

View article:
Do you have what it takes to withstand modern DDoS attacks?

Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, information security leaders must aim to automate as much of the IR cycle as possible. However, this does not mean automation can replace humans. Microsoft releases Spectre fixes for Windows 10 on Skylake CPUs Microsoft has pushed out a new set of Spectre (variant 2) security updates. For the … More ?

See the article here:
Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE