How memcached reflection threatens IT security

2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

IoT Security and Artificial Intelligence for better industrial applications

Watch this 45-minute free webinar, and gain insights about IoT & Industrial IoT, Edge, and AI through a detailed analysis of each stage of the IoT device lifecycle.
Watch Now

Operationalizing Threat Intelligence to Battle Persistent Actors

ThreatConnect

Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation state threat and Monzy will do a live demonstration of operationalizing the new Threat Intelligence.
Watch Now

Industry 4.0 and the ICS & OT Cybersecurity Challenges with Digital Transformation

Targeted industrial cyberattacks are increasing at an alarming rate, especially within the manufacturing sector, costing companies an average of $2M per breach, this doesn’t even consider brand damage, downtime, penalties, or potential lawsuits. On average hackers are moving silently in networks 6 months before they are found. Sound scary? Well yeah, it is! Don’t worry we’re here to help.
Watch Now

Zimperium & IBM MaaS360

Zimperium

Zimperium has integrated IBM MaaS360 into zConsole, the administrative console that supports our award-winning mobile threat defense (MTD) solution, zIPS. With “Zimperium for MaaS360,” MaaS360 owners can now detect mobile risks and threats with Zimperium, and then set compliance and remediation policies them via MaaS360. Watch our on-demand webinar to learn more about Zimperium’s integration with IBM MaaS360. In this recorded event, we review how Zimperium and IBM work together, including: Deployment / activation.
Watch Now