StephanieWeagle

About Stephanie Weagle

Stephanie Weagle brings over 13 years of marketing and communications experience to Corero Network Security. As Vice President of Marketing for the Corero DDoS protection solutions, Stephanie strives to accelerate market penetration of the award winning Corero real-time DDoS mitigation product portfolio. Stephanie has been instrumental in establishing Corero as a category creator for automatic, scalable DDoS protection that is architected to meet the needs of any Internet dependent organization, including, mid-tier hosting and service providers, on-line gaming entities, tier-1 carriers and large online enterprises.

Posts by Stephanie Weagle

Fending Off DDoS Ransomware Demands

Besides the financial loss that a company may experience by paying the ransom, companies must consider another risk: i.e., that they still will be subject to a DDoS attack by the hacker.

Read more

Ponemon Report Weighs in on the Internet of Things

According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.

Read more

The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity

Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

WannaCry Ransomware Attack Wreaks Havoc Across Globe

May 12, 2017 now marks an unwelcome milestone in hacking history; the largest-ever ransomware attack occurred that day, affecting thousands of private and public sector agencies across 150 countries.

Read more

5 Essential Qualities to Look for in a DDoS Mitigation Solution

When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.

Read more

What ISPs Need To Know About CLDAP DDoS Attack Vectors

The Corero Security Operations team has identified significant exploitation of the CLDAP attack vector in attack attempts against its customers since it was first disclosed in October 2016.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

Myths that Surround Cloud-based DDoS Mitigation

Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.

Read more

Lack of IoT Security Fuels Terabit DDoS Attacks

Learn why unsecured IoT devices have become the backbone source for current and future multi-terabit distributed denial of service (DDoS) attacks.

Read more

Mirai IoT Malware Now Infecting Windows Systems

The Windows-based spreader appears to have been created by a developer with advanced skills, and has a richer and more sophisticated code and components than the original Mirai malware. 

Read more

What is the Benefit of Real-Time DDoS Mitigation? Let a Corero Customer Tell You!

The following post is contributed by our friends at Zare, a UK based hosting provider for quality, affordable and DDoS protected dedicated hosting solutions.

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

IoT-Driven Botnet Attacks US University

To avoid experiencing similar incidents, companies need to pay close attention to the network settings for their IoT devices and, where possible, separate them from access to the Internet and to other devices.

Read more

Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data

Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

5 Cyber Security Questions to Ask an Internet Service Provider

Business depends upon Internet reliability and security, so when it comes to choosing your Internet Service Provider (ISP), it pays to ask the right questions. Given the prevalence of DDoS attacks, one can no longer assume that that your Internet service will be 1) always reliable or 2) “clean.”  

Read more

Traditional Layers of Defense Are Not Enough to Stop DDoS Attacks

Although DDoS mitigation solutions have been around for nearly 20 years, there are still some myths about DDoS attacks and much debate about how to best protect a network.

Read more

The Dangers of Underestimating DDoS Attacks

Organizations should be wary of being quick to claim that their business systems have not been affected by a DDoS attack, because this can be extremely difficult to ascertain.

Read more

How to Handle Terabit-Scale DDoS Attacks

In the wake of so many DDoS attacks in recent months/years, many enterprises and agencies are seeking ways to protect themselves from such attacks, and the burden of stopping DDoS attacks should fall mostly on Internet Service Providers and Hosting Providers.

Read more

DDoS Attacks Open the Door to Ransomware

Short DDoS attacks might seem harmless, in that they don't cause extended periods of downtime. But IT teams who choose to ignore them are effectively leaving their doors wide open for ransomware attacks or other more serious intrusions.

Read more

BlackNurse DoS Attack – What You Should Know

Researchers have warned that a low-volume BlackNurse DoS attack can easily take down certain firewalls.

Read more

Can DDoS Attacks Be Prevented by Policies or Legislation?

To avoid future DDoS attacks, several U.S. lawmakers have called on the government to improve cyber security protections and consider new rules for web traffic. Would such laws or policies help?

Read more

4 New Trends in the DDoS Threat Landscape

The now infamous DDoS attack on DNS provider DYN broke records for the sheer size of the attack. Unfortunately, the scale of that attack is likely to become commonplace in the near future because of a perfect storm of four trends brewing in cyberspace.

Read more

Help Prevent IoT Devices from Becoming DDoS Botnet Slaves

It’s impossible to make sure that every IoT device is immune to botnet enslavement; however, there are things that companies and consumers can do to make it more difficult for DDoS hackers.

Read more

The Impact of Recent DDoS Attacks Against DNS Infrastructure

Websites across the East Coast were impacted as a result of a reported DDoS attack against a well-known DNS provider’s Infrastructure.  The online availability of popular brands such as Twitter, Spotify, Basecamp, Netflix and a laundry list of others were impacted.

Read more

DDoS Attacks: How Service Providers Can Protect the Media

In the run-up to the US election, we can expect to see more and more of the types of DDoS attack that took Newsweek offline last week. However, these attacks can easily be defeated by service providers, at the network edge.

Read more

Modern or Legacy DDoS Protection? The Important Differences

DDoS attacks have evolved over the years and, thankfully, so has DDoS protection technology. However, not all DDoS solutions are equal.

Read more

The IoT Makes it Easier to Launch Massive DDoS Attacks

Despite its advantages, the Internet of Things (IoT) comes with a host of security disadvantages, allowing hackers to harness connected devices for a variety of nefarious purposes, including DDoS attacks.

Read more

911 Systems at Risk for TDoS Attack Takedown

Researchers from Ben Gurion University in Israel recently discovered that cyber criminals could launch a telephony denial-of-service (TDoS) attack that could take over thousands of smartphones to form a zombie army of botnets that would automatically dial repeated calls to a 911 system.

Read more

The Links Between Ransom, Ransomware and DDoS Attacks

Of all the cyber threats today, distributed denial of service (DDoS) ransom attacks and ransomware are high on the list of IT security concerns because they are growing more common and they are expensive to remediate.

Read more

Study: 78% of Businesses Not Prepared for Security Breaches

A new study published by international consulting firm KPMG and telecoms group BT recommends that businesses collaborate with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry in a concerted effort to improve cyber security.

Read more

Why is the UK a Prime Target for DDoS Attacks?

Reports surfaced last week that the UK has now become the world’s second most targeted nation for DDoS attacks, following a 220% rise in the number of attacks globally in the last year.

Read more

Lessons Learned from the Australian Census DDoS Attack

After the DDoS attack on Australian Bureau of Statistics, what can we learn from it? The incident highlights the importance of having DDoS protection at the network perimeter, as well as reliable analytics and clear visibility in the event of a DDoS attack.

Read more

Does “DDoSCoin” Crypto Currency Encourage More DDoS Attacks?

Recent academic research reinforces the fact that DDoS attacks are not going away, especially if hackers are rewarded with crypto currency.

Read more

A Blizzard of DDoS Attacks on the Gaming Industry

It may be summertime in the Northern Hemisphere, but the first week of August has been marked by a blizzard. A virtual blizzard, that is, of DDoS attacks on some gaming companies.

Read more

NATO Declares the Internet a War Zone

NATO recently published a Cyber Defense Pledge, recognizing the growing threat of nation state cyber warfare and the need for greater cyber security and collaboration among allies.

Read more

Corero Emphasizes Network Threat Protection at HostingCon 16

This year the leading conference for hosting providers featured an emphasis on cyber security and network protection, with many attendees interested in adding DDoS mitigation to their portfolio of services.

Read more

DDoS Attack Trends in the Gaming Industry

From historic DDoS attacks against the PlayStation Network to the recent sustained attacks against Blizzard, DDoS attacks have become such a regular occurrence in the gaming industry that it has almost become an accepted part of the culture. This blog looks at a few commonalities that indicate how and why these attacks occur.

Read more

IT Security Professionals Want Better DDoS Protection from Service Providers

Corero polled over 100 IT security professionals at the Infosecurity Europe 2016 conference in London last month, and the survey shows that UK businesses are not only worried about DDoS attacks, they want better protection from their Internet Service Providers.

Read more

Meet Corero’s Family of DDoS Mitigation Hardware

If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.

Read more

New Report Points to Alarming DDoS Attack Statistics and Projections

A new report from Cisco includes data on DDoS attacks worldwide, citing increased size and frequency of attacks. However, Corero finds that the vast majority of attacks targeting customers are 1Gbps or less in size.

Read more

DDoS Protection Increases Customer Retention for Telecoms

Retaining and growing accounts for existing customers is much easier than gaining new ones, particularly in the telecommunications industry, which has significant turnover. But which technologies offer the greatest opportunities for this kind of advancement?

Read more

Cyber Criminals Sell Compromised Servers to Carry Out DDoS Attacks

A major underground marketplace is selling access to more than 70,000 compromised servers, allowing buyers to carry out widespread cyberattacks around the world.

Read more

Cyber Security & DDoS Protection: Major Themes at Big Communications Event

At last week's Big Communications Event, the annual gathering of experts in the telecoms and communications industry, one major topic was how to secure the provider network and protect downstream customers from cyber threats.

Read more

All Gigs Are Not Created Equal: DDoS Protection Makes a Difference for ISPs

When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.

Read more

Anonymous Launches DDoS Attacks on Banks in "Op Icarus"

Banks across the globe need maximum security not only for their safes and vaults, but also for their networks.

Read more

Benefits of Real-Time DDoS Protection

If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.

Read more

DDoS Protection – Why Hosting Providers Need It!

Hosting providers face increasing pressure to prevent DDoS attacks from infiltrating their networks. Here are three primary reasons why providers need to implement DDoS protection, and three benefits they'll gain from doing so.

Read more

Majority of Enterprise Customers Want Better DDoS Protection from ISPs

FierceMarkets and Corero jointly published a new research report based on a survey of ISPs and enterprise customers regarding DDoS mitigation strategies. The report discusses not only the traditional methods of DDoS mitigation, but also the rationale of some ISPs who have not yet adopted more effective anti-DDoS technology.

Read more

Corero Receives “Recommended” Rating in NSS DDoS Prevention Solutions Security Value Map

Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.

Read more

A Telecom Case Study: Deployment of DDoS Mitigation Solution

In a recent webinar hosted by IHS on “Service Provider Deployment of DDoS Mitigation,” Stephen Clark, Director of IP Networks at Telesystem, explained that Block Communications implemented the Corero SmartWall® Threat Defense System on each of its vital interconnects to Tier 1 providers. The solution is in-line deployment of automatic DDoS mitigation that stops malicious traffic at the peering edge. “We can protect our networks at the gate, in real-time,” said Clark.

Read more

Clear and Comprehensive Visibility into DDoS Attack Mitigation

Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.

Read more

In-Line, Always-On DDoS Protection Makes Sense for Service Providers

It's not practical or cost effective to handle DDoS attacks with a swing to a cloud scrubbing service; they must be mitigated locally to maintain availability, performance and latency.

Read more

DDoS Attacks Rise in Size, Sophistication and Frequency

Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.

Read more

Mitigating Multi-Vector DDoS Attacks

Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.

Read more

DDoS Rings in the New Year With a Vengeance

High profile DDoS attacks rang in the new year in full force, starting 2016 with a flood (no pun intended) of activity. The morning of New Year’s Eve, BBC websites and other associated online services went dark due to a DDoS attack. Since the outage, hacker group “New World Hackers” have stepped forward claiming responsibility, indicating that the attack was carried out as a “test of its capabilities”.

Read more

DDoS Lessons Learned, and Staying Ahead of These Threats in 2016

The DDoS attack landscape of 2015 has brought a consistent spattering of headlines that further highlight the severity of this type of cyber-attack.

Read more

ProtonMail Gives in to DDoS Ransom

Last month I published a post in reference to the surge in ransom driven DDoS attacks against Corero’s customers. “Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin ransoms. Through...

Read more

Corero Observes Surge in Ransom Driven DDoS Attacks

The Corero Security Operations Center has seen an increase in cyber-extortionists targeting web hosting providers with Bitcoin ransom demands. Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin...

Read more

DDoS extortion campaigns on the rise

Just recently the Internet Complaint Center (IC3) issued an alert to businesses regarding a rise in extortion campaigns, tied to threats of DDoS attack activity unless a ransom is paid. The rise in DDoS attacks generally, is not surprising at all and the use of the “DDoS threat” for ransom or extortion is not a new tactic in...

Read more

This week in DDoS attacks – Protest and Activism

Ideological motivations for DDoS attacks can impact anyone at any time. This week, two high profile organizations Planned Parenthood and New York Magazine were severely impacted by ideological hacktivists taking down their websites with DDoS attacks.

Read more

DDoS Attack Kicks Canadian Government Websites Offline

The Canadian Federal Government’s network service availability was impacted by reported ‘large-scale’ DDoS attacks earlier this week.  Reports indicate that the illustrious Anonymous group has claimed responsibility for these outages, due to outrage over the recently passed anti-terror Bill C-51.  Attacks left the...

Read more

Sorry Kids, Your Final Exam Has Been DDoS’d

It’s that time of year when Colleges and Universities are hustling and bustling with year-end activities such as graduation, senior occasions, final athletic events and countless ceremonies. It’s also the time when final exams are well underway. Perhaps it is a coincidence (or maybe quite the opposite) that we are hearing of several...

Read more

Man your battle stations – DDoS is pulling a fast one on you

The DDoS threat landscape is a broad, ever evolving and dynamic topic that is covered by many different perspectives. One angle that doesn’t always get the spotlight is the use of DDoS attacks as a diversionary tactic or profiling mechanism for advanced assaults against a target victim. Traditionally the term “DDoS” has been...

Read more

Are DDoS attacks getting bigger or smaller?

There has been a flurry of DDoS reports from DDoS protection vendors as of late, and Corero has thrown its hat in the ring as well. The recently released Corero DDoS Trends and Analysis report offers a unique perspective of the growing DDoS threat; offering a stark contrast to the majority of the reports saturating the headlines this month. The...

Read more