Stephanie Weagle brings over 13 years of marketing and communications experience to Corero Network Security. As Vice President of Marketing for the Corero DDoS protection solutions, Stephanie strives to accelerate market penetration of the award winning Corero real-time DDoS mitigation product portfolio. Stephanie has been instrumental in establishing Corero as a category creator for automatic, scalable DDoS protection that is architected to meet the needs of any Internet dependent organization, including, mid-tier hosting and service providers, on-line gaming entities, tier-1 carriers and large online enterprises.
There is no shortage of malware on the Dark Web. In particular, during the past week security researchers from various points around the world have been talking about three threats, two of which are variants of the now infamous Mirai botnet code.
Today’s distributed denial of service (DDoS) attacks are almost unrecognizable from the early days of attacks, when most were simple, volumetric attacks intended to cause embarrassment and brief disruption.
Researchers have discovered a massive new botnet, dubbed ‘Reaper’ or ‘IoTroop’, targeting poorly-defended IoT devices to form a ‘zombie army’ of devices that could rock the entire Internet with a powerful DDoS attack.
DDoS attacks cost not only time and money in the form of internal or external IT resources to bring a company’s network back online, but also create loss of revenue, brand reputation and customer trust.
At last week’s CLOUDSEC 2017 conference, Corero CEO Ashley Stephenson spoke to attendees about the importance of mitigating the “everyday” small-scale distributed denial of service (DDoS) attacks that are pervasive and harmful to global businesses.
Companies that have European constituents must prepare for the European Union General Data Protection Regulation that will go into effect in May 2018. The link between DDoS attacks and data theft should not be ignored.
According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.
Corero Network Security, in conjunction with Fierce Telecom has released "The Future of DDoS Protection: Turning the Threat into a Revenue Generating Opportunity". This executive summary highlights the unique needs of Service Providers, when deploying DDoS mitigation for infrastructure protection, as well as a new service offering for their customers.
Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.
When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.
If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.
Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.
A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.
To avoid experiencing similar incidents, companies need to pay close attention to the network settings for their IoT devices and, where possible, separate them from access to the Internet and to other devices.
Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.
Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.
DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.
Business depends upon Internet reliability and security, so when it comes to choosing your Internet Service Provider (ISP), it pays to ask the right questions. Given the prevalence of DDoS attacks, one can no longer assume that that your Internet service will be 1) always reliable or 2) “clean.”
In the wake of so many DDoS attacks in recent months/years, many enterprises and agencies are seeking ways to protect themselves from such attacks, and the burden of stopping DDoS attacks should fall mostly on Internet Service Providers and Hosting Providers.
Short DDoS attacks might seem harmless, in that they don't cause extended periods of downtime. But IT teams who choose to ignore them are effectively leaving their doors wide open for ransomware attacks or other more serious intrusions.
The now infamous DDoS attack on DNS provider DYN broke records for the sheer size of the attack. Unfortunately, the scale of that attack is likely to become commonplace in the near future because of a perfect storm of four trends brewing in cyberspace.
Websites across the East Coast were impacted as a result of a reported DDoS attack against a well-known DNS provider’s Infrastructure. The online availability of popular brands such as Twitter, Spotify, Basecamp, Netflix and a laundry list of others were impacted.
In the run-up to the US election, we can expect to see more and more of the types of DDoS attack that took Newsweek offline last week. However, these attacks can easily be defeated by service providers, at the network edge.
Despite its advantages, the Internet of Things (IoT) comes with a host of security disadvantages, allowing hackers to harness connected devices for a variety of nefarious purposes, including DDoS attacks.
Researchers from Ben Gurion University in Israel recently discovered that cyber criminals could launch a telephony denial-of-service (TDoS) attack that could take over thousands of smartphones to form a zombie army of botnets that would automatically dial repeated calls to a 911 system.
Of all the cyber threats today, distributed denial of service (DDoS) ransom attacks and ransomware are high on the list of IT security concerns because they are growing more common and they are expensive to remediate.
A new study published by international consulting firm KPMG and telecoms group BT recommends that businesses collaborate with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry in a concerted effort to improve cyber security.
After the DDoS attack on Australian Bureau of Statistics, what can we learn from it? The incident highlights the importance of having DDoS protection at the network perimeter, as well as reliable analytics and clear visibility in the event of a DDoS attack.
This year the leading conference for hosting providers featured an emphasis on cyber security and network protection, with many attendees interested in adding DDoS mitigation to their portfolio of services.
From historic DDoS attacks against the PlayStation Network to the recent sustained attacks against Blizzard, DDoS attacks have become such a regular occurrence in the gaming industry that it has almost become an accepted part of the culture. This blog looks at a few commonalities that indicate how and why these attacks occur.
Corero polled over 100 IT security professionals at the Infosecurity Europe 2016 conference in London last month, and the survey shows that UK businesses are not only worried about DDoS attacks, they want better protection from their Internet Service Providers.
If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.
A new report from Cisco includes data on DDoS attacks worldwide, citing increased size and frequency of attacks. However, Corero finds that the vast majority of attacks targeting customers are 1Gbps or less in size.
Retaining and growing accounts for existing customers is much easier than gaining new ones, particularly in the telecommunications industry, which has significant turnover. But which technologies offer the greatest opportunities for this kind of advancement?
At last week's Big Communications Event, the annual gathering of experts in the telecoms and communications industry, one major topic was how to secure the provider network and protect downstream customers from cyber threats.
When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.
If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.
Hosting providers face increasing pressure to prevent DDoS attacks from infiltrating their networks. Here are three primary reasons why providers need to implement DDoS protection, and three benefits they'll gain from doing so.
FierceMarkets and Corero jointly published a new research report based on a survey of ISPs and enterprise customers regarding DDoS mitigation strategies. The report discusses not only the traditional methods of DDoS mitigation, but also the rationale of some ISPs who have not yet adopted more effective anti-DDoS technology.
Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.
In a recent webinar hosted by IHS on “Service Provider Deployment of DDoS Mitigation,” Stephen Clark, Director of IP Networks at Telesystem, explained that Block Communications implemented the Corero SmartWall® Threat Defense System on each of its vital interconnects to Tier 1 providers. The solution is in-line deployment of automatic DDoS mitigation that stops malicious traffic at the peering edge. “We can protect our networks at the gate, in real-time,” said Clark.
Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.
Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.
Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.
High profile DDoS attacks rang in the new year in full force, starting 2016 with a flood (no pun intended) of activity. The morning of New Year’s Eve, BBC websites and other associated online services went dark due to a DDoS attack. Since the outage, hacker group “New World Hackers” have stepped forward claiming responsibility, indicating that the attack was carried out as a “test of its capabilities”.
Last month I published a post in reference to the surge in ransom driven DDoS attacks against Corero’s customers.
“Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin ransoms. Through...
The Corero Security Operations Center has seen an increase in cyber-extortionists targeting web hosting providers with Bitcoin ransom demands. Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin...
Just recently the Internet Complaint Center (IC3) issued an alert to businesses regarding a rise in extortion campaigns, tied to threats of DDoS attack activity unless a ransom is paid.
The rise in DDoS attacks generally, is not surprising at all and the use of the “DDoS threat” for ransom or extortion is not a new tactic in...
Ideological motivations for DDoS attacks can impact anyone at any time. This week, two high profile organizations Planned Parenthood and New York Magazine were severely impacted by ideological hacktivists taking down their websites with DDoS attacks.
The Canadian Federal Government’s network service availability was impacted by reported ‘large-scale’ DDoS attacks earlier this week. Reports indicate that the illustrious Anonymous group has claimed responsibility for these outages, due to outrage over the recently passed anti-terror Bill C-51. Attacks left the...
It’s that time of year when Colleges and Universities are hustling and bustling with year-end activities such as graduation, senior occasions, final athletic events and countless ceremonies. It’s also the time when final exams are well underway. Perhaps it is a coincidence (or maybe quite the opposite) that we are hearing of several...
The DDoS threat landscape is a broad, ever evolving and dynamic topic that is covered by many different perspectives. One angle that doesn’t always get the spotlight is the use of DDoS attacks as a diversionary tactic or profiling mechanism for advanced assaults against a target victim.
Traditionally the term “DDoS” has been...
There has been a flurry of DDoS reports from DDoS protection vendors as of late, and Corero has thrown its hat in the ring as well. The recently released Corero DDoS Trends and Analysis report offers a unique perspective of the growing DDoS threat; offering a stark contrast to the majority of the reports saturating the headlines this month.