Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Infrastructure Attacks vs. Application Attacks

An infrastructure attack aims to exploit vulnerabilities in the network layer or transport layer. These attacks are called DDoS attacks and include SYN floods, Ping of Death, and UDP floods. Infrastructure attacks can be broken down into two subcategories: volumetric attacks and protocol attacks. Volumetric attacks focus on inundating a server with false requests to overload its bandwidth, while protocol attacks target specific protocols to crash a system.

AWS hit by Largest Reported DDoS Attack of 2.3 Tbps

A significant milestone occurred with the reported largest DDoS attack on Amazon Web Services (AWS) reaching 2.3 terabits per second. This is a substantial increase of 70% from the previous record holder, the Memcached-based GitHub DDoS attack in 2018, which measured 1.35 terabits per second. Over the years, these attention-grabbing performance gains in DDoS attacks have been rising consistently, with major high-profile attacks happening every two years.

Preventing Cyberattacks Against HR Teams

IT leaders count on Human Resource (HR) departments to be partners in promoting an organizational culture that values security. From setting device usage policies on an employee’s first day to facilitating security training and awareness, HR has an important role to play in the adoption of IT policies. In their day-to-day roles, HR is critical to security in its own right.

10 of the Most Common IoT Hacks and How to Defend Against Them

The Internet of Things (IoT) has revolutionised the way we live and work, connecting devices and systems to the internet and each other to create a more efficient and interconnected world. However, as with any new technology, the IoT comes with its own set of security risks and vulnerabilities. In this blog, we will look at the 10 most common IoT hacks and how to defend against them.

Under the Wing: Detecting Fileless Attacks with Advanced Memory Scanning

In 2021, over 60% of all attacks were malware free. Because malware free or fileless attacks can be carried out entirely in memory, detection can be challenging. But with new cutting-edge Advanced Memory Scanning capabilities, organizations can quickly automate high-performance scanning to detect the most advanced attacks.

The impact of cyber fouling and how scavengers might capitalize on it

The cyber landscape is ever-evolving. Organizations have started moving their resources to the cloud excessively to scale up their deliverables. The hybrid work culture and BYOD policies have made an organization’s network increasingly perimeter-less. With organizations adopting different policies to increase operational efficiency, SOCs scramble to ensure security in the network. As for attackers who are opportunists by nature, the hybrid work model introduces a lot of opportunities.

An ethical hacker's perspective on EASM

Gunnar Andrews discusses how ethical hackers can look to EASM techniques to help increase their ethical hacking skills. For organizations, this article gives insight into the methods and types of information that ethical hackers or even malicious attackers will collect to increase knowledge about an organization’s assets.

Preventing Cyberattacks Against Marketing Teams

In promoting a company and its products, marketing oversees critical points of contact between the business and its customers. Marketing teams make sure a company and its products are known in the broader market, gain the interest of potential customers and guide customers through the buying process. Just as importantly, marketing teams promote and steward a company’s brand — one of its most valuable assets.