Enterprise DDoS Protection Posts

Mirai Botnet Code Targets Corporate Networking Gear

Last month a report from Palo Alto Networks’ Unit 42 revealed that cyber criminals have now evolved the infamous Mirai botnet code to target corporate SD-WAN gear and recruit those assets into harmful botnets. To defend against such attacks, a security system must include comprehensive automated protections against Mirai type attack vectors.

Read more

Enterprises Beware: Variations on the Mirai Malware Still Feeding DDoS Attacks

The Mirai Malware first attracted public attention in October 2016, when it was used to launch the notorious and massive botnet-driven distributed denial of service (DDoS) attacks against Brian Krebs’ blog and Dyn’s DNS infrastructure. Now, Tech Target reports that researchers at Palo Alto Networks have discovered another new variant of the Mirai malware that is “going after wireless presentation and display systems, indicating a potential shift in using Mirai to target enterprises.”

Read more

Survey Indicates Lack of Enterprise DDoS Awareness and Protection

Last month, I had the honor to host a workshop at the R3: Resilience, Response & Recovery Summit in London, with two of my fellow Corero colleagues: Sean Newman and Peter Cutler.

Read more

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

Pundits Speculate: Did Russian Hackers Launch DDoS Attacks on Dutch Organizations?

The Dutch national tax office said its website went offline briefly, for 5-10 minutes. Regardless of how long they were under DDoS attack, those afflicted Dutch organizations should also be concerned about a security breach.

Read more

View earlier posts in the archive