DNS-Related DDoS Attacks Are on the Rise
Domain Name System (DNS)-related distributed denial of service (DDoS) attacks are on the rise because hacktivists and cyberterrorists are finding it easy to use botnets to stage large volumetric reflection an...
The Internet Systems Consortium just released a couple of days ago a new patch (version 9.10.3-P4) to fix some issues in the most popular DNS server software in the world.
The release note is available at https://kb.isc.org/article/AA-01363/81/...
A recently released executive level report by Fortinet included a brief overview of key findings resulting from Fortinet’s Cyber Threat Assessment Program (CTAP) running across a multitude of organizations nationwide for a period of four mont...
You missed Insomni'hack?
You shouldn't have: although there are now something like 700 attendees, it's still a friendly and well organized hacking conference with an interesting mix between wild hackers, CTOs, and CISOs (some being hacke...
Because of the recent outbreak of the Locky ransomware, Dridex has become synonymous with the distribution of ransomware more generally. However, Dridex is still taking good care of its notorious original business– banking Trojans. While p...
It’s evident that demand for trained and experienced cybersecurity professionals far exceeds supply. With 46% of organizations now claiming that they have a problematic shortage of cybersecurity skills, significantly up from last year at just 2...
Ever since the arrival of advanced persistent threats, obfuscation technologies have existed to help cybercriminals evade security detection and tracing. It’s an ongoing evolution of technology on the bad guys’ end.
It really started wit...
It came to our attention that a new, rather peculiar version of Nemucod has been recently landing on users. Nemucod is a well-known JavaScript malware family that arrives via spam email and downloads additional malware to PCs. Most recently, Nemucod...
We have all embraced online searching and shopping. The days of driving around town to compare costs or referring to the most current newspaper advertisement for a bargain have long gone. Today’s consumer reaches out via the Internet on a varie...
“Houston, we have a problem.” This is not news to healthcare organizations, whether they are in Houston, Boston, St. Louis or San Francisco. 2015 was a banner year in healthcare, for all the wrong reasons. The increasing number of attacks...
UDP floods are used frequently for larger bandwidth DDoS attacks because they are connectionless and it is easy to generate UDP packets using scripts.
DNS uses UDP primarily and under some circumstances uses TCP. Because of the usage of UDP pr...
Firewall deployments can be characterised by episodes of intense activity interspersed with long periods of “I assume it’s working ok”. However, between the cutover and Business as Usual (BAU) transition the long term feed and water...
Every smartphone these days is equipped with ways to connect to WiFi. When your phone is looking for networks to join, it’s detectable by local routers. In a retail store, there’s often additional equipment that can detect your phone&rsqu...
It’s been over two weeks since we reported about Locky and predicted that it will be a major player in the ransomware scene. We decided to check our Intrusion Prevention System (IPS) telemetry statistics for CryptoWall, TeslaCrypt and Locky two...