<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: ddos

BOTNETS 101: INFAMOUS BOTNETS OF THE 21ST CENTURY

A botnet is a distributed network consisting of many compromised internet-connected devices, which are controlled by a centralized botmaster, and are utilized to perform synchronized tasks. Each infected machine is called a bot, and together their power is used to carry out various attacks. Botnets are usually created via malware infections, which gain persistence on the machines and “recruit” them to the botnet. Some of these malware variants can even self-propagate through networks, infecting many devices via one network entry point. The bandwidth amount “taken” from each bot is relatively small, so that the victim will not realize that their device is being exploited, but when thousands or even millions of machines are simultaneously instructed to perform a joint, targeted attack, the damage can be immense.

Although we are used to thinking of botnets as a collection of computers, these networks can be comprised of various types of devices – personal computers, laptops, mobile devices, smart watches, security cameras, and smart house appliances.

Our Security Research Team has created a timeline of the  most famous, dangerous and costly botnets of the century. Download the timeline here, or check it out at the bottom of this post.
Read More

Share this:

Are You Prepared For 5G?

5G is here, and it is definitely changing 21st century technology. The fifth generation of wireless connectivity marks a new era for devices of all kinds, serving as critical infrastructure to promote the digitization, automation and connectivity of machines, robots, smart appliances, transport solutions and more. In addition to advanced infrastructure technologies - smartphones, computers and Internet-of-Things devices are extremely prevalent in every home - and they’re getting smarter. With the increased demand for connectivity and 5G-enabled IoT devices, vendors are rushing their products to be the first on the market, trying to beat out the competition on the way. According to Statista, there will be a whopping 74 Billion connected devices by 2025. Even last month’s Black Friday deals on next generation smartphones and smart devices may very well have equipped another couple million Americans with 5G-compatible devices. But despite the excitement and hype around smart technologies, this race-to-market is creating a gaping hole where strong security and advanced technology must meet. Vendors are sacrificing security testing, allowing potential vulnerabilities to remain hidden in the backend of devices.

Read More

Share this:

Why You Need to Block the Threat Factory. Not Just the Threats.

 

Cyber criminals will create roughly 100 million new malware variants over the next 12 months. Security vendors will respond with new malware signatures and behaviors to stop them, but thousands of companies will be victimized in the process, experiencing costly or catastrophic breaches. This isn’t new - it’s a cycle.

Read More

Share this:

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

Read More

Share this:

ThreatSTOP Packs a Security Punch. Here's How in a Short Video. (Humor Included)

Read More

Share this:

Kasidet POS Malware Spread Through Fake Security Update

Kasidet (also known as Neutrino Bot) is a malware targeting Point of Sale (POS) devices that performs memory scraping to steal credit card information and browser hooking to steal sensitive data from web browsers on infected devices.

Read More

Share this:

Another reason to block China

There have been a number of reports in the last week or two of websites that are apparently being DDoSed from IP addresses in the PRC. This has caused a certain amount of confusion and pain to those affected because there seemed to be no reason for the attack, however the cause has now become clear. As Sucuri explain on their blog, the cause appears to be the so-called "Great Firewall of China":

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter