The only way to fight today’s cyber-attacks is to be prepared. Read these short articles that provide observations, explanations and information about today’s threat landscape.
Since the first DoS attack was launched in 1974, DDoS attacks and other DoS attacks have remained among the most persistent and damaging cyber-attacks. These attacks reflect hackers’ frustratingly high levels of tenacity and creativity—and create complex and dynamic challenges for anyone responsible for cyber security.
This piece profiles the various types of hackers, their motivations, and the tools of the trade. In the old days, hacking was as much an art as it was a science. It required a distinct set of skills, proficiencies and capabilities. Today, attack services are purchased and sold via the Clearnet and Darknet.
Hackers are now using attacks as the means to another, potentially more devastating, end: stealing data. In these attacks, cybercriminals distract business and IT resources to pursue larger objectives. The key is being prepared and having the proper DDoS detection and mitigation solutions and processes in place.
Every day, new cyber security attacks are discovered. How can we prepare for the challenge? Knowledge is the answer! Stay aware of the latest threats and vulnerabilities and familiarize yourself with the language of cyber security.
In 2012, Dropbox, the popular file hosting service, was the victim of a largescale cyber-attack during which attackers obtained large volumes of email and password data. It has been recently discovered that the data stolen in the 2012 breach has been leaked and that over 68 million accounts have been comprised.
In today’s hyper-connected world, nearly all businesses, regardless of size or
industry, have some element of their operations based online. From the largest
online retailers and financial service companies to gaming and social media
brands, organizations are transforming how they conduct business and have
become increasingly dependent on network-based services.
Businesses of all sizes, across all verticals, generate significant sales online,
increasing their risk and exposure from outages and breaches. Unfortunately,
malicious actors understand this and target online businesses with this in mind.