How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security

The Internet of Things is here to stay. Despite the market’s rapid growth and the high level of risk, many companies still neglect IoT security.

The post How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security appeared first on Security Intelligence.

Continue reading How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security

Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed

Distributed denial-of-service (DDoS) attacks have been all over the news in recent months, with hacktivist groups taking major targets completely offline. According to IBM Managed Security Services data, the vast majority of DDoS attacks come in one of two flavors: SYN flood attacks, in which bad actors send multiple SYN requests to a victim’s webserver […]

The post Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed appeared first on Security Intelligence.

Continue reading Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed

Anonymous Unleashes Gold Medal DDoS Tools

The dust, waves and jubilation have settled on the sports festivities of this past summer. Since we’re in the business of cybersecurity, let’s reflect on one of the malicious activities that attempted to derail focus from this spirited event. Going into the games, many analysts expected the event to be marred by cybercriminal activity spanning […]

The post Anonymous Unleashes Gold Medal DDoS Tools appeared first on Security Intelligence.

Continue reading Anonymous Unleashes Gold Medal DDoS Tools

Going for Gold: Cybercrime and the Brazilian Threat Landscape

The upcoming Summer Olympics in Rio de Janeiro provide an opportunity for cybercriminals to exploit the Brazilian threat landscape.

The post Going for Gold: Cybercrime and the Brazilian Threat Landscape appeared first on Security Intelligence.

Continue reading Going for Gold: Cybercrime and the Brazilian Threat Landscape

Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture?

Organizations with weak security posture are an attractive target for cybercriminals, and they may find themselves coming under fire frequently.

The post Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture? appeared first on Security Intelligence.

Continue reading Fool Me Once, Shame on You — Fool Me Eight Times, Shame on My Security Posture?

Hacktivism: Fearmongering or Real Threat?

Organizations must be prepared for possible hacktivism campaigns by arming themselves with the best defensive tools and security strategies.

The post Hacktivism: Fearmongering or Real Threat? appeared first on Security Intelligence.

Continue reading Hacktivism: Fearmongering or Real Threat?