Tag Archives: whitepapers

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for software bugs more rapidly than a human can, and get them accepted by human developers and permanently merged in the code base? How to make the CFO your best cybersecurity friend Good cybersecurity is extremely expensive, and bad cybersecurity is, well… even more expensive. It’s very … More ? The post Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend appeared first on Help Net Security .

See the article here:
Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

VestaCP users warned about possible server compromise

Unknown attackers have compromised the official distribution of the VestaCP hosting control panel solution to harvest server IPs and admin credentials. That information was exploited to install malware with DDoS capabilities (Linux/ChachaDDoS) on victims’ web servers. About the software A web hosting control panel is a web-based interface provided by a web hosting service that allows users to manage their servers and hosted services. There are many web hosting control panels out there. Some are … More ? The post VestaCP users warned about possible server compromise appeared first on Help Net Security .

View article:
VestaCP users warned about possible server compromise

A10 Networks provides cloud, Internet and gaming providers with 1 RU DDoS defense appliance

A10 Networks launched the A10 Thunder 7445 Threat Protection System (Thunder TPS), the performance 1 rack unit (RU) and density of throughput per RU appliance. Now cloud, Internet and gaming providers can protect their infrastructure with A10 DDoS defense while enjoying the cost benefits of 100 GbE networking in the smallest form factor. A10 Network’s Thunder TPS is a DDoS protection solution that offers precision in detecting and mitigating against the full spectrum of DDoS … More ? The post A10 Networks provides cloud, Internet and gaming providers with 1 RU DDoS defense appliance appeared first on Help Net Security .

Read More:
A10 Networks provides cloud, Internet and gaming providers with 1 RU DDoS defense appliance

Acorus Network protects enterprises and service providers from DDoS attacks

Acorus Networks is raising $6 million from Elaia Partners, Partech and Kima Ventures. This funding round will contribute to Acorus Networks’ mission to protect customers whose business activity relies on the Internet, in fields such as banking, e-commerce, gambling, government and healthcare. According to IDC Research’s recent US DDoS Prevention Survey, more than 50% of IT security decision makers admit that their organization had been the victim of DDoS attacks 10 times in the past … More ? The post Acorus Network protects enterprises and service providers from DDoS attacks appeared first on Help Net Security .

See original article:
Acorus Network protects enterprises and service providers from DDoS attacks

US Signal partners with Cloudflare to deliver DDoS protection service

US Signal announced that it has partnered with Cloudflare to bring a distributed denial-of-service (DDoS) protection service to market. The new service delivers DDoS mitigation for network, transport and application layers and is backed by a SLA. It is powered by Cloudflare’s global Anycast network and is implemented by US Signal’s information security and provisioning team, with support and customization from its technical operations engineers. US Signal partnered with Cloudflare because of the scale, performance … More ? The post US Signal partners with Cloudflare to deliver DDoS protection service appeared first on Help Net Security .

Read More:
US Signal partners with Cloudflare to deliver DDoS protection service

DDoS attackers increasingly strike outside of normal business hours

DDoS attack volumes have increased by 50% to an average of 3.3 Gbps during May, June and July 2018, compared to 2.2 Gbps during the previous quarter, according to Link11. Attacks are also becoming increasingly complex, with 46% of incidents using two or more vectors. While attack volumes increased, researchers recorded a 36% decrease in the overall number of attacks. There was a total of 9,325 attacks during the quarter: an average of 102 attacks … More ? The post DDoS attackers increasingly strike outside of normal business hours appeared first on Help Net Security .

Read the original:
DDoS attackers increasingly strike outside of normal business hours

Researchers open source tools to identify Twitter bots at scale

Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning algorithms to identify bot accounts across their dataset, Duo Labs researchers also unraveled a sophisticated cryptocurrency scam botnet consisting of at least 15,000 bots, and identified tactics used by malicious bots to appear legitimate and avoid detection, among other findings. The research From May to July 2018, researchers collected and analyzed … More ? The post Researchers open source tools to identify Twitter bots at scale appeared first on Help Net Security .

Read More:
Researchers open source tools to identify Twitter bots at scale

Intensifying DDoS attacks: ?Choosing your defensive strategy

One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. “Over the last six months, our State of the Internet Report found that companies suffered 41 DDoS attacks on average over the last six months,” he points out. The rise and rise of DDoS attacks As Arbor Networks CTO Darren Anstee recently pointed out, DDoS attacks have become a … More ? The post Intensifying DDoS attacks: ?Choosing your defensive strategy appeared first on Help Net Security .

Read more here:
Intensifying DDoS attacks: ?Choosing your defensive strategy

ERP applications under attack: How criminals target the crown jewels

Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise in cyberattacks on widely-used enterprise resource planning (ERP) applications such as SAP and Oracle — which currently have a combined 9,000 known security vulnerabilities. The report also highlights an increase in attacks on these systems by nation-state actors, cybercriminals and hacktivists that include both hacking and DDoS attempts to compromise … More ? The post ERP applications under attack: How criminals target the crown jewels appeared first on Help Net Security .

View original post here:
ERP applications under attack: How criminals target the crown jewels

Free training courses on DDoS protection, from introduction to mitigation

The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. If you’re involved in IT security or network operations, you know that DDoS attacks are a problem that’s not going away. Recent studies indicate that almost 75% of organizations have suffered at least one attack over the past 12 months. What’s inside? This comprehensive quiz-based training course, available at both the Basic and Advanced levels, … More ? The post Free training courses on DDoS protection, from introduction to mitigation appeared first on Help Net Security .

Originally posted here:
Free training courses on DDoS protection, from introduction to mitigation