sean.newman@corero.com

About Sean Newman

Sean Newman is Director Product Management for Corero Network Security.  Sean has worked in the security and networking industry for twenty years, with previous roles including network security Global Product Manager for Cisco, who he joined as part of their acquisition of cyber-security vendor Sourcefire, where he was Security Evangelist and Field Product Manager for EMEA.  Prior to that he was Senior Product Manager for endpoint and network security vendor Sophos, after having spent more than 12 years as an Engineer, Engineering Manager and then Senior Product Manager for network infrastructure manufacturer 3Com.

 

Posts by Sean Newman

Automated DDoS Protection Can Reduce CISO Stress

A recent Security Magazine UK article reports on a survey by Nominet Cybersecurity that quantified the work stress today’s CISOs endure. CISOs have a Sisyphean task of protecting every IT system and point of data, yet they commonly lack adequate budget, they often suffer a shortage of qualified cybersecurity staff, and security breaches are rampant.

Read more

DDoS Considerations for On-Premises Servers

There has been much hype around cloud computing in recent years, to the extent that it appeared the answer was to run everything in ‘the cloud’, as-a-service. Now the dust has settled somewhat, there is a level of pragmatism setting in.

Read more

What is a DDoS Attack and Why Should You Worry?

A distributed denial-of-service (DDoS) attack occurs when multiple systems overwhelm the available bandwidth or other system resources of their target; as a result, an application, service or website may either crash or suffer a significantly degraded service. In an always-on world, where many organizations rely on constant Internet connectivity to conduct business online, DDoS attacks are a serious issue.

Read more

Evolving DDoS Threat Challenges Service Provider Capacity

The DDoS threat continues to grow in sophistication as cybercriminals improve their attack techniques in an attempt to evade the trusted mitigation methodologies typically used for DDoS protection.

Read more

Enterprises Beware: Variations on the Mirai Malware Still Feeding DDoS Attacks

The Mirai Malware first attracted public attention in October 2016, when it was used to launch the notorious and massive botnet-driven distributed denial of service (DDoS) attacks against Brian Krebs’ blog and Dyn’s DNS infrastructure. Now, Tech Target reports that researchers at Palo Alto Networks have discovered another new variant of the Mirai malware that is “going after wireless presentation and display systems, indicating a potential shift in using Mirai to target enterprises.”

Read more

RSA 2019 Highlighted the Importance of Automation - Making SOCs More Efficient

Earlier this month Corero sent a team to the annual RSA Conference, where several education tracks and other exhibitors on the show floor also included discussions around the challenges of dealing with the latest wave of sophisticated distributed denial of service (DDoS) attacks.

Read more

Automated DDoS Mitigation Is Essential

Today, organizations of all types and sizes face distributed denial of service (DDoS) attacks; creating a top business continuity and security issue. The ongoing proliferation of DDoS-for-hire services, powered mainly by the continuing explosion of unsecure Internet of things (IoT) devices, has turned DDoS attacks into an everyday occurrence.

Read more

New Report: Latest DDoS Trends

The distributed denial of service threat continues to increase. Corero recently published our 2018 DDoS Trends Report, and the findings suggest that enterprises and service providers have ample reason to put DDoS mitigation at the forefront of their cybersecurity strategies.

Read more

Five Myths About DDoS Attack Protection

It’s a pity when myths get in the way of facts, especially in terms of cybersecurity, where there is little margin for error. When it comes to DDoS protection, several myths have been floating around for years, and it’s important to debunk them. Below are the top five DDoS myths, countered with the sobering facts:

Read more

Brexit and the Cybersecurity skills gap: Could automation provide a solution?

The cyber threat landscape is constantly evolving and expanding, as a result, organizations require increasing numbers of trained IT security personnel to mitigate against this threat. Unfortunately, the cybersecurity skills gap is a well-documented and growing issue within the industry.

Read more

Do Service Provider Networks Need Better Security?

How are communications service providers (CSPs) coping with network security threats these days? Heavy Reading conducted an anonymous survey of CSPs who are members of their Thought Leadership Council. According to that survey, “Council members say there are several security issues driving the development of those plans, including distributed denial of service (DDoS), illegal intercept, ransomware and data exfiltration, all of which were seen as critical issues by more than 60% of panelists.”

Read more

Minor Outages Do Matter

It’s a common misconception that distributed denial of service (DDoS) is all about the very large attacks. The highest volume attacks certainly make all the headlines, but they are actually a tiny minority of the overall DDoS threat. The fact is that small DDoS attacks are an everyday occurrence for many organizations.

Read more

The Dangerous Power of DDoS-for-Hire

It was reported in late December 2018 that law enforcement officials from the US, the UK, and the Netherlands, had seized the domains of 15 DDoS-for-hire sites. News reports suggested that the sites were taken down just before Christmas, because it is notoriously a time when hacker groups target retailers and gaming providers in a bid to disrupt their services.

Read more

How the Cyber Grinch Stole Christmas

The Cyber Grinch hated Christmas! The whole retail season! With Christmas fast approaching, he exclaimed “It’s practically here, I must find a way to stop Christmas from coming!”. He sat at his computer with his red coat and hat. ‘With this hat and this coat, I look just like Saint Nick’ he said with a laugh.

Read more

5G Will Increase DDoS Attack Risk

The next generation of wireless communications, known as 5G, is on the horizon. Telecoms providers such as Sprint, T-Mobile, AT&T and others are in a race to rollout 5G services that will empower smart devices and the Internet of Things (IoT).

Read more

Black Friday and Cyber Monday – Prime Time for Cyber Crime

Black Friday and Cyber Monday are just around the corner, and while holiday shoppers are making their lists and checking them twice, no doubt cyber criminals are making their own lists—of e-commerce sites to target.

Read more

DerpTroll: Despite the crime, will he even do time?

In 2013 and 2014 the cyber security industry was taken by storm after gaming super giants, including Sony, EA and Steam, were taken offline by DDoS attackers. The attackers went by the name of DerpTroll and they used Twitter to coordinate DDoS attacks and generally cause internet chaos.

Read more

DDoS Attacks on the Rise Again and Size Doesn’t Matter

Organizations today are heavily reliant on the internet to function and if anything is done to disrupt this availability, it can have catastrophic repercussions on the way those organizations operate. Distributed Denial of Service (DDoS attacks), in particular, can inflict the gravest consequences to a business and cause damage to a brand’s reputation, customer trust and revenue. What is even more staggering is that the frequency of DDoS attacks has once again risen in the past year.

Read more

Instagram – the New Advertising Platform for Botnets

Recent reports have revealed that cybercriminals are using the popular social media site, Instagram, as a marketplace to advertise the rental of Botnets. The advertisements do not make it clear how powerful the botnets are; however, some posts are claiming to provide cheap access to the Mirai botnet, which was behind one of the largest cyberattacks in history.

Read more

A Gambling Company Ups the Ante to Woo Players Back after DDoS Attacks

In the past month several online poker sites, as well as the DraftKings fantasy sports site, have been hit hard by distributed denial of service (DDoS) attacks. Clearly, even if those companies had DDoS mitigation solutions in place, they were not sufficient to protect their networks.

Read more

The Current State of DDoS Attacks: Are They Getting Smarter?

There has been a flurry of DDoS reports in the last few months, highlighting the evolving state of DDoS threats and warning of an upcoming wave of even bigger and more dangerous attacks. The sheer number of vulnerable connected devices out there, combined with the hacker community’s unrelenting ability to find new vulnerabilities to exploit, has significantly increased the potential scale of DDoS attacks.

Read more

How Improving Password Security Helps Protect Against Botnets

The DDoS threat landscape has been transformed by the emergence of Internet of Things botnets. Password hygiene of consumer and industrial IoT devices is often lax leading to easy criminal exploitation and potentially devastating attacks. The exponential growth in the number of IoT connected devices is a key driver in the ever increasing scale of the largest DDoS attacks.

Read more

Botnet-driven DDoS Attacks Represent a Developing Cyberthreat

Security researchers recently discovered a new variant of the famous Hide and Seek (HNS) botnet, which infected nearly 90,000 unique devices from the time of its discovery at the start of the year. The botnet, the world’s first to communicate via a custom-built peer to peer protocol, has now also become the first IoT malware strain that, under certain conditions, can survive a device reboot and remain on infected devices after the initial compromise.

Read more

Minding Your MANRS

Maintaining the resilience and stability of the global Internet requires collaborative efforts between Internet Service Providers (ISPs), government agencies, enterprises, security vendors and end users.

Read more

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

New DDoS Protection for Physical or Virtual Environments

Corero recently launched the SmartWall Network Threat Defense - Virtual Edition (vNTD), which brings real-time DDoS attack visibility and mitigation to virtualized environments, for more diverse, flexible deployment possibilities.

Read more

How to Handle DDoS Attacks: A Critique of DDoS Myths

A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.

Read more

The Importance of DDoS Attack Visibility

As sophisticated DDoS threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. Analysis of past events is valuable to help prepare for future threats.

Read more

DDoS-for-Points: How to Beat Hackers at Their Own Game

DDoS attacks are popular among online game players, and recently a Turkish hacker created a game that rewards players for launching DDoS attacks against a set of political websites.

Read more

Sub-Saturating DDoS Attacks Steal Bandwidth

Sub-saturating, surgical DDoS attacks can be a threat to any organization, but the impact on Service Providers can be even greater.

Read more

6 DDoS Attack Protection Myths

Having been in the business of DDoS protection for many years, Corero has seen plenty of bad advice thrown around by various cyber pundits. Below we have put together 6 common myths around DDoS protection, and our response to them.

Read more

Online Gaming Companies are EA-sy Targets for DDoS Hackers

Recent DDoS attacks on Blizzard and EA servers highlight the vulnerability of the online gaming industry. Fortunately, gaming companies— or, for that matter, all companies that rely on a continuous online presence— now have better choices that can deliver near-instantaneous protection.

Read more

Strategies Shifting for DDoS DNS Amplification Attacks

New research presented at the Black Hat conference indicates that DDoS DNS amplification attacks are now more likely to use SSDP than NTP, and that DDoS attacks may generally be smaller than are commonly reported.

Read more

Automated DDoS Protection Hardware Fills a Gap in Network Security

There is no shortage of cyber threats, but there is a shortage of trained IT security personnel to guard against them. With automated DDoS mitigation in place, IT security staff would have more time to handle other cyber security threats.

Read more