Attack Detection: The Crucial First Step in DDoS Mitigation

| May 31, 2017

article image
At Corero, we understand that early detection is a fundamental part of any security solution. When most people think of distributed denial of service (DDoS) attacks, they think of massive volumetric attacks that crash websites or networks. In reality, the majority of DDoS attacks are small in size and duration; i.e., only a few minutes long, and under 1 Gbps, which makes them difficult to detect. Most legacy and homegrown DDoS mitigation tools are generally configured with detection thresholds that ignore that level of activity.

Spotlight

MailChannels

MailChannels is a leading provider of outbound anti-spam and email delivery technology. The company improves the reliability of email delivery for shared hosting, dedicated hosting, VPS and cloud hosting companies, as well as enterprise companies that struggle with IP blacklisting and spam issues.

OTHER ARTICLES

Progress Is the Promise in National Cybersecurity Strategy

Article | March 23, 2020

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of the application of those changes. Since 2016, with the introduction of the construct of persistent engagement and the subsequent development of defend forward, all these variables have changed in a positive manner.

Read More

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | February 12, 2020

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

Covid-19 cyber security threat to impact businesses

Article | April 1, 2020

With millions of employees having to work from home, companies are having to look at how to keep as many business-critical functions running as possible while at the same time maintaining adequate security. “In the last week alone, we have seen phishing emails go from 25,000 a day to 125,000 – a 500 per cent increase – which means the risk is real," explains Andrew Jackson, CEO of Intercity Technology. "Whilst firewalls included within domestic broadband routers are considered sufficient for personal use and occasional homeworking, they’re not necessarily capable of withstanding prolonged periods of remote working from a large proportion of the workforce, which is why we are seeing more businesses and their employees become the targets of malicious hackers. "Just because employees are now home based doesn’t mean that security and privacy regulations such as GDPR are null and void and therefore, working closely with a trusted IT security partner is vital to help mitigate against any potential risks.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 16, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Spotlight

MailChannels

MailChannels is a leading provider of outbound anti-spam and email delivery technology. The company improves the reliability of email delivery for shared hosting, dedicated hosting, VPS and cloud hosting companies, as well as enterprise companies that struggle with IP blacklisting and spam issues.

Events