Building a threat intelligence team from the ground up can be riddled with political inertia. This whitepaper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats.
Discover the six core competencies that comprise a...
Australia's census debacle has prompted questions over whether main contractor IBM made errors, and if the Australian Bureau of Statistics underestimated the resources it needed to successfully power a busy, online service.
The Australian Bureau of Statistics took its online census submission form offline after several distributed denial-of-service attacks, a move that is likely to only fuel worries over privacy and data safety.
For years, organizations have been threatened by DDoS attacks on several fronts, ranging from volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks. Trey Guinn of CloudFlare discusses how to respond to each type of attack.
Anonymous is threatening global banks with 30 days of distributed denial-of-service attack disruptions and temporarily disrupted the Bank of Greece website as a preview. Security experts say all banks should take the DDoS threat seriously.
The United States and Israel hacked into Iran's military and civilian infrastructure as part of a secret program code-named "Nitro Zeus" that was designed to disable the country's critical infrastructure on demand, claims the new documentary film "Zero Days."
In the era of the cloud, the always-on workforce and high levels of digital literacy, your customers, prospects, staff and suppliers expect 24/7 network access and availability. However, 24/7 access is not enough; your data needs protection from any number of potential security breaches. These can happen when data is...
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Q2 2015 was dominated by attacks launched by DD4BC, the same malicious group responsible for several Bitcoin extortion campaigns in
2014. DD4BC expanded its extortion and DDoS campaigns during April and May 2015, where over the course of one week, several customers received ransom emails in which the group warned...
European police have arrested a "main target" as part of a previously undisclosed law enforcement effort, dubbed Operation Pleiades, against the distributed denial-of-service attack gang called DD4BC, or "DDoS for Bitcoin."
While DDoS attacks were once deemed primarily a nuisance, experts now say they're becoming a routine strategy cybercriminals use as part of a campaign to commit fraud or extortion. What are the four key attack trends to watch out for in 2016?
The second quarter of 2015 set a record for the number of distributed
denial of service (DDoS) attacks recorded - more than double what was reported in q2 2014. The profile
of the typical attack, however, has changed. In q2 last year, high-bandwidth,
short-duration attacks were the norm, driven by the use of...
Three Greek banks are the latest DDoS shakedown targets of online attackers, who demanded a payment of 20,000 bitcoins ($7.2 million) to cease their attempted banking site disruptions. Security experts say such attacks are on the rise.
Buoyed by massive illicit profits, cybercriminals have continued to refine their ransomware attacks, including updating their crypto techniques to foil decryption tools, encrypting file names and threatening to leak stolen secrets.
The Q2 2015 State of the
Internet-Security Report builds on the significant changes
made in last quarter's report. In this edition, attack data
previously published in the classic State of the Internet
Report is combined with the data previously published in the quarterly
Prolexic DDoS Attack Report. The two...