The cyber threat landscape is dynamic and accelerating. These DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating advanced, targeted threats.
DDoS extortion comes in many forms. Campaigns over the past three years have varied in their nature and continue to evolve over even the past few months. What lessons can be learned from the latest attacks?
Download this eBook on DDoS and extortion and learn about:
Characteristics of today's prevalent...
DDoS has undergone a serious change in attack strategy. In previous years it was used a means of gaining hacking credibility in the underground, taking out competitors or just disrupting business normality or the industry.
However, a recent string of attacks has not followed convention, and is forcing security...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and...
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
This whitepaper is...
The Australian Bureau of Statistics blames IBM for failing to stop distributed denial-of-service attacks that crippled its website on the evening of the country's largest-ever online census. But were census-takers misinterpreted as DDoS attackers?
DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, recent research from Forrester suggests many companies are coming up short in their DDoS attack protection strategy. Learn how changes in processes or technology can improve...
Website security firm CloudFlare is warning organizations worldwide to be on the lookout for an increase in larger DDoS attacks. But these NTP attacks are far less sophisticated than the earlier DDoS attacks that targeted U.S. banks.
From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
Smaller banking institutions are not as aware as they should be of the risks distributed-denial-of-service attacks pose when it comes to account takeover incidents, says former federal banking examiner Amy McHugh, who analyzes security measures all institutions should be implementing.
If everyone supports the idea of sharing cyberthreat information, then why is information sharing so difficult? Shawn Henry, a former investigator with the FBI, tells how organizations can clear their biggest hurdles.
Mark Weatherford, who recently stepped down as DHS deputy undersecretary for cybersecurity, says that although planned OpUSA DDoS attacks may initially be a nuisance, they represent a genuine long-term threat to the government.
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
Anonymous says its OpUSA attack planned for May 7 aims to 'wipe' government and banking websites from the Internet. Security experts say the threat is real, but are U.S. organizations taking it seriously?