The most significant DDoS attacks in the past year

DDoS attacks are getting larger and more complex moving towards mobile networks and IoT, which are now used in cyberwarfare. In this Help Net Security video, Steve Winterfeld, Advisory CISO at Akamai, discusses the most powerful DDoS attacks in the pas… Continue reading The most significant DDoS attacks in the past year

Out of the blue: Surviving an 18-hour, 39M-request DDoS attack

No online business can afford to neglect malicious bot threats. Attackers and fraudsters increasingly leverage bots to automate and coordinate attacks, driving IT teams and ill-equipped security tools to their limits. Only a full-endpoint, 360° bot pro… Continue reading Out of the blue: Surviving an 18-hour, 39M-request DDoS attack

Personal cybersecurity is now a company problem

As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the new reality. In this Help Net Security video, Amir Targighat, CEO at Agency, di… Continue reading Personal cybersecurity is now a company problem

Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide

In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and procedures employed by cybercriminals in recent months. These are: The exploitation… Continue reading Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide

Key observations on DDoS attacks in H1 2022

In the first half of 2022, the amount of DDoS attacks increased by 75.6% compared to the second half of 2021, according to new Nexusguard research revealed in the company’s DDoS Statistical Report for 1HY 2022. In this Help Net Security video, Juniman … Continue reading Key observations on DDoS attacks in H1 2022

Police breaks up criminal ring that hacked keyless systems to steal cars

A car theft ring that used fraudulent software to “hack” and steal vehicles with remote keyless entry and ignition systems has been dismantled by the French National Gendarmerie, Europol announced on Monday. “The criminals targeted ve… Continue reading Police breaks up criminal ring that hacked keyless systems to steal cars

Attackers use novel technique, malware to compromise hypervisors and virtual machines

Unknown attackers wielding novel specialized malware have managed to compromise VMware ESXi hypervisors and guest Linux and Windows virtual machines, Mandiant threat analysts have discovered. They named the malware VirtualPITA (ESXi & Linux), Virt… Continue reading Attackers use novel technique, malware to compromise hypervisors and virtual machines