How Falling Crypto Prices Impacted Cyber Crime

Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto? Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, […]

The post How Falling Crypto Prices Impacted Cyber Crime appeared first on Security Intelligence.

Continue reading How Falling Crypto Prices Impacted Cyber Crime

Breaking Down the Seven Steps of an SQL Injection Kill Chain

Cyberattacks can cause immense damage to an organization’s system and have only increased in frequency over recent years. SQL injection is an especially devastating example. This form of attack involves exploiting a website or application code through the use of Structured Query Language (SQL). It is considered one of the most severe cyber threats, as […]

The post Breaking Down the Seven Steps of an SQL Injection Kill Chain appeared first on Security Intelligence.

Continue reading Breaking Down the Seven Steps of an SQL Injection Kill Chain

What CISOs Should Know About Hacking in 2023

The art of cyber crime is in a constant state of flux and evolution. Simply staying on pace with these trends is a significant part of the CISO’s job. Today’s modern CISO must ensure they are always prepared for the next big trend and remain ahead of adversaries. As we begin to navigate 2023, the […]

The post What CISOs Should Know About Hacking in 2023 appeared first on Security Intelligence.

Continue reading What CISOs Should Know About Hacking in 2023

The Most Prolific Ransomware Gangs of 2022

As we look forward to 2023, we can find many ransomware lessons in looking back at 2022. The year brought us numerous attacks by many of the same gangs we’ve watched for years, as well as some newcomers. Many ransomware gangs operate like businesses, with their own marketing departments and user documentation. With the advent […]

The post The Most Prolific Ransomware Gangs of 2022 appeared first on Security Intelligence.

Continue reading The Most Prolific Ransomware Gangs of 2022

20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet

It was considered the “largest ever” internet attack in 2002. This distributed denial of service attack hit seven of the 13 servers at the top of the internet’s domain name system hierarchy. Now, 20 years later, its origins remain mysterious, but its methods and size still make it stand out. It isn’t the largest by […]

The post 20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet appeared first on Security Intelligence.

Continue reading 20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet

Be Prepared for Increased DDoS Attacks Ahead of Black Friday

Black Friday is prime time for distributed denial-of-service (DDoS) attacks, especially as retail goes online even more than usual in 2020. Forecasters predict e-commerce sales will soar to new heights this holiday season, increasing by as much as 35% year-over-year. This explosion in online shopping brings new challenges to retailers, including managing logistics and supply chains. […]

The post Be Prepared for Increased DDoS Attacks Ahead of Black Friday appeared first on Security Intelligence.

Continue reading Be Prepared for Increased DDoS Attacks Ahead of Black Friday

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. […]

The post DDoS Attacks Increase in Size, Frequency and Duration appeared first on Security Intelligence.

Continue reading DDoS Attacks Increase in Size, Frequency and Duration

Vulnerable Powerline Extenders Underline Lax IoT Security

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through home’s existing electrical circuitry. The kit, in collaboration with X-Force Red, IBM Security’s team of hackers, aligns with the HomePlug AV2 technology and provides wired speeds […]

The post Vulnerable Powerline Extenders Underline Lax IoT Security appeared first on Security Intelligence.

Continue reading Vulnerable Powerline Extenders Underline Lax IoT Security

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Organizations can attain visibility into their operational technology (OT) environments by building out a combined OT/IT security operations center.

The post Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC appeared first on Security Intelligence.

Continue reading Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

What Is a DDoS Attack?

After 20 years, distributed denial-of-service (DDoS) attacks can still result in critical damage to businesses. Learn more about how to mitigate a DDoS attack on your corporate network.

The post What Is a DDoS Attack? appeared first on Security Intelligence.

Continue reading What Is a DDoS Attack?