Archive: 2017

Fending Off DDoS Ransomware Demands

Besides the financial loss that a company may experience by paying the ransom, companies must consider another risk: i.e., that they still will be subject to a DDoS attack by the hacker.

Read more

How to Handle DDoS Attacks: A Critique

A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.

Read more

Ponemon Report Weighs in on the Internet of Things

According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.

Read more

Benefits of Automatic DDoS Protection in a Hosting Environment

It’s relatively easy for hackers to launch distributed denial of service (DDoS) attacks against a web hosting provider, because they have such large attack surfaces.

Read more

Attack Detection: The Crucial First Step in DDoS Mitigation

If your IT security system fails to detect and block the majority of DDoS attacks, how can you be sure that your network is truly safe from other incursions?

Read more

The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity

Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

WannaCry Ransomware Attack Wreaks Havoc Across Globe

May 12, 2017 now marks an unwelcome milestone in hacking history; the largest-ever ransomware attack occurred that day, affecting thousands of private and public sector agencies across 150 countries.

Read more

DDoS Attack Briefly Cripples the FCC Comment System

It’s hardly surprising that DDoS attacks finally caught the attention of politicians; it was just a matter of time until a DDoS attack affected a government agency. A combination of events has led to more awareness of cyber threats, including DDoS attacks.

Read more

5 Essential Qualities to Look for in a DDoS Mitigation Solution

When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.

Read more

DDoS Attacks: The Changing Legal and Regulatory Landscape

Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.

Read more

The Threat of North Korea’s DDoS-driven Cyber Attack

DDoS attacks can cripple crucial Internet systems. Learn about the potential damage a cyber attack wielded by North Korea could do.

Read more

What ISPs Need To Know About CLDAP DDoS Attack Vectors

The Corero Security Operations team has identified significant exploitation of the CLDAP attack vector in attack attempts against its customers since it was first disclosed in October 2016.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

DDoS Attacks and Political Hacks

The British House of Commons issued a report last week, indicating the possibility that hackers from Russia or China launched a DDoS attack that crashed the United Kingdom's voter registration website before the deadline to register for the historic Brexit vote. Was that the likely cause of the crash, and could something similar happen in the US?

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

Myths that Surround Cloud-based DDoS Mitigation

Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.

Read more

How Can a DDoS Attack Be Part of a Security Breach?

A recent study by BitDefender showed that 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. Companies must realize that DDoS attacks are often part of the toolkit for cyber criminals to launch a security breach.

Read more

Is DDoS Protection Worth the Investment?

Anti-DDoS technology has often been difficult or costly for individual organizations to deploy. Fortunately, DDoS defense solutions have evolved, enabling hosting providers and ISPs to offer affordable DDoS protection to their customers.

Read more

Lack of IoT Security Fuels Terabit DDoS Attacks

Learn why unsecured IoT devices have become the backbone source for current and future multi-terabit distributed denial of service (DDoS) attacks.

Read more

DDoS Attacks, Who Dunnit? The Fight for Improved Detection and Protection

A recent Kaspersky Lab study found that many businesses that have suffered DDoS attacks believe that their competitors launched the attacks. Is there evidence to support their beliefs?

Read more

Mirai IoT Malware Now Infecting Windows Systems

The Windows-based spreader appears to have been created by a developer with advanced skills, and has a richer and more sophisticated code and components than the original Mirai malware. 

Read more

What is the Benefit of Real-Time DDoS Mitigation? Let a Corero Customer Tell You!

The following post is contributed by our friends at Zare, a UK based hosting provider for quality, affordable and DDoS protected dedicated hosting solutions.

Read more

The Importance of DDoS Attack Visibility

As sophisticated DDoS threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. Analysis of past events is valuable to help prepare for future threats.

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

If You Haven’t Already Been DDoS’ed, Assume You Will Be

Some companies are keenly aware of attacks on their networks, but other companies are not. Even in some companies that have dedicated IT security staff and systems in place, major security breaches have occurred. It can take months or even years for an organization to realize that it has been breached.

Read more

IoT-Driven Botnet Attacks US University

To avoid experiencing similar incidents, companies need to pay close attention to the network settings for their IoT devices and, where possible, separate them from access to the Internet and to other devices.

Read more

Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data

Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.

Read more

DDoS Attacks Won't Be Blocked by Black Holing/Null Routing

Anti-DDoS solutions have evolved dramatically over the past few years, so it’s surprising to see occasional articles that still recommend outdated approaches, such as remote black holing (also called null routing) to stop unwanted traffic.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

Untangling the Dark Web behind Mirai IOT Botnet DDoS Attacks

Security researcher Brian Krebs believes he has unraveled the mystery of who launched a massive Mirai botnet DDoS attack on his site in September of 2016. If Krebs’ allegation is true, then this is a seamy tale of a good programmer who went bad: a white hat turned into a black hat.

Read more

How DDoS Attacks Impact Hosting Providers [Part 2] – Data Security

On its own, a DDoS attack is not a security breach; however, it can pose a serious data security risk for hosting providers and others. Learn why IT security teams cannot afford to ignore DDoS threats, no matter how small the attacks may be.

Read more

How DDoS Attacks Impact Hosting Providers [Part 1] – Web Availability

Most hosting providers experience DDoS attacks on a nearly daily basis, even if they are typically not volumetric attacks that drag down an entire network. When a hosting provider gets hit with a volumetric attack, the ramifications can be far-reaching and long-lasting.

Read more

Law Enforcement Tries to Curb DDoS Attacks

Law enforcement is at a disadvantage against hackers, mostly because distributed denial of service (DDoS) attacks leave little or no trace of evidence. However, police have made some arrests recently, which counts as a tiny bit of progress in the uphill battle against cyber criminals.

Read more