How memcached reflection threatens IT security

Link11

2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats. Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
Watch Now

Spotlight

"This report presents the results of an international research project commissioned by ISACA to the University of Antwerp—Antwerp Management School (Belgium), focused on establishing an international benchmark and a business value assessment of COBIT 5. The benchmarking results constitute the first part of the report, and the second part focuses on the business value assessment of COBIT 5 by looking at the association between the use of COBIT enablers and processes and the achievement of IT-related and enterprise goals. 
The detailed survey results, summarized in this publication, provide to a broad audience of ISACA members, GEIT professionals and COBIT users highly valuable benchmarking information and insights, on which a business case for adopting COBIT 5 guidance can be built."

OTHER ON-DEMAND WEBINARS

Catch the Intruder in his Tracks - Advanced Threat Hunting

panda

The threat landscape has evolved significantly over the past twenty plus years, this webinar will highlight these changes and reveal how threats have advanced. The latest security paradigm for the endpoint detection and response will be brought to light and the implications for organisations debated.
Watch Now

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now

The Future of Phishing: It’s all about your customers

SEGASEC

While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.
Watch Now

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now

Spotlight

"This report presents the results of an international research project commissioned by ISACA to the University of Antwerp—Antwerp Management School (Belgium), focused on establishing an international benchmark and a business value assessment of COBIT 5. The benchmarking results constitute the first part of the report, and the second part focuses on the business value assessment of COBIT 5 by looking at the association between the use of COBIT enablers and processes and the achievement of IT-related and enterprise goals. 
The detailed survey results, summarized in this publication, provide to a broad audience of ISACA members, GEIT professionals and COBIT users highly valuable benchmarking information and insights, on which a business case for adopting COBIT 5 guidance can be built."

resources