Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

How Secure Software Updates Can Prevent Cyber Attacks on Connected Devices

Regularly updating the software on your connected devices is essential to keep them secure from cyber-attacks. To maintain security, it is crucial to install software updates that often contain important security patches that fix vulnerabilities that hackers could exploit. Without these updates, your devices could be at risk of being hacked. Keeping software up to date is vital for cybersecurity and performance, ensuring your devices are protected against vulnerabilities and run efficiently.

A Guide to Building Modern Approaches to DDoS Protection

The digital world thrives on constant connectivity, making websites and online services the cornerstones of countless businesses. But these crucial platforms are constantly under siege by malicious actors. Distributed denial of service (DDoS) attacks, where attackers overwhelm an online service infrastructure with a flood of traffic, pose a significant threat, causing service disruption and downtime which results in financial losses and reputational damage.

8 Ways to Combat Credential Stuffing and Brute Force Attacks

We’re in an era of connectivity and convenience, but this has also opened the floodgates to a new wave of cyber threats. Among the most insidious and pervasive is credential stuffing, a cyberattack that exploits the human tendency to reuse passwords across multiple online accounts. This threat is more than just a digital inconvenience. Verizon’s 2024 Data Breach Investigations Report reveals that more than 49% of breaches caused by external actors involve stolen credentials.

RADIUS/UDP vulnerable to improved MD5 collision attack

The MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely two different messages X1 and X2 where MD5(X1) = MD5 (X2). Over the years, attacks on MD5 have only continued to improve, getting faster and more effective against real protocols. But despite continuous advancements in cryptography, MD5 has lurked in network protocols for years, and is still playing a critical role in some protocols even today.

DDoS threat report for 2024 Q2

Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024. With a 280 terabit per second network located across over 230 cities worldwide, serving 19% of all websites, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.

The Crucial Role of Cybersecurity in Safeguarding Our Digital World

In today's increasingly connected world, cybersecurity has emerged as one of the most critical issues facing individuals, businesses, and governments alike. As we rely more heavily on digital systems for everything from communication and commerce to healthcare and critical infrastructure, the need to protect these systems from cyber threats has never been greater.

Uncovering the Polyfill.io Supply Chain Attack

In this video, we will be uncovering how a sneaky supply chain attack on the JavaScript Polyfill.io service compromised websites across the globe, including big names like Intuit, Square, the U.S. government and more. Stay tuned to find out how the attack occurred and what you can do to prevent it!

How to Create a Ransomware Recovery Plan & Prevent Attacks

Ransomware isn’t just a threat—it’s a harsh reality facing IT professionals in many industries. And while Kubernetes and OpenShift are powerful platforms for modern infrastructure, they introduce unique complexities that cybercriminals can exploit. The fallout from a successful attack is well documented: significant financial loss, operational downtime, and potential damage to your organization’s reputation.

Why Do You Need Cloud-Based DDoS Protection?

The cloud offers unparalleled flexibility and scalability, from data storage to maintaining an online presence. However, this increased reliance on cloud infrastructure also brings heightened risks, particularly from DDoS attacks. Recent incidents underscore the urgent need for robust DDoS protection. For instance, the HTTP/2-based DDoS attack peaked last August, reaching over 398 million requests per second.

Understanding an 0ktapus Phishing Campaign

The recent surge in phishing attacks capable of bypassing multi-factor authentication (MFA) has raised significant concerns in the cybersecurity landscape. These attacks highlight the fact that even systems protected by MFA have vulnerabilities, making it imperative for organizations to stay vigilant and not rely on a single control as a silver bullet. One such campaign, known as 0ktapus, provides a crucial case study in understanding the methods and impacts of these phishing attacks.