How memcached reflection threatens IT security

Link11

2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now

Spotlight

Cyber-Attacken wie der SolarWinds-Angriff erinnern uns daran, dass unsere heutigen Gegenspieler – sowohl Cyberkriminelle als auch feindselige staatliche Akteure – nicht ruhen. Sie arbeiten beständig an innovativen Angriffsmethoden und werden immer raffinierter, arglistiger und beharrlicher. Bei der Entwicklung ihrer Angriffe ver

OTHER ON-DEMAND WEBINARS

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

Enabling and Securing Remote Users of Teams

Microsoft recently reported that video calls on the Microsoft Teams platform grew more than 1,000% during the month of March, and they've added more than 12 million daily active users to the robust collaboration tool. According to Forrester, 85% of security breaches occur because of mismanaged licenses. Watch now to hear our sec
Watch Now

Under the Radar – The Future of Undetected Malware

Malwarebytes

The future is not full of easy to detect junkware, but hard to remediate and dangerous malware. Cybercriminals are becoming more sophisticated and adopting anti-forensic techniques that evade defenses with hard to remediate malware, like fileless attacks. Watch our webinar and learn about: The future of undetected malware. The latest and hardiest threats to remediate like Sam Sam, Sorebrect, Emotet and TrickBot. How prominent cybersecurity vendors cannot protect you from these threats.
Watch Now

The Role of Threat Intelligence in Cyber Resilience

Omnibus healthcare information security

When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization? Most organizations don't even know when security controls have failed. This is a primary reason why intrusions exist in organizations for upwards of 200 days before being discovered. Additionally, heuristic and homogeneous alerts provide virtually zero context about anomalous activity inside the internal network and do nothing to help cyber defense teams prioritize and correctly remediate cyberattacks.
Watch Now

Spotlight

Cyber-Attacken wie der SolarWinds-Angriff erinnern uns daran, dass unsere heutigen Gegenspieler – sowohl Cyberkriminelle als auch feindselige staatliche Akteure – nicht ruhen. Sie arbeiten beständig an innovativen Angriffsmethoden und werden immer raffinierter, arglistiger und beharrlicher. Bei der Entwicklung ihrer Angriffe ver

resources