sean.newman@corero.com

About Sean Newman

Sean Newman is Director Product Management for Corero Network Security.  Sean has worked in the security and networking industry for twenty years, with previous roles including network security Global Product Manager for Cisco, who he joined as part of their acquisition of cyber-security vendor Sourcefire, where he was Security Evangelist and Field Product Manager for EMEA.  Prior to that he was Senior Product Manager for endpoint and network security vendor Sophos, after having spent more than 12 years as an Engineer, Engineering Manager and then Senior Product Manager for network infrastructure manufacturer 3Com.

 

Posts by Sean Newman

Instagram – the New Advertising Platform for Botnets

Recent reports have revealed that cybercriminals are using the popular social media site, Instagram, as a marketplace to advertise the rental of Botnets. The advertisements do not make it clear how powerful the botnets are; however, some posts are claiming to provide cheap access to the Mirai botnet, which was behind one of the largest cyberattacks in history.

Read more

A Gambling Company Ups the Ante to Woo Players Back after DDoS Attacks

In the past month several online poker sites, as well as the DraftKings fantasy sports site, have been hit hard by distributed denial of service (DDoS) attacks. Clearly, even if those companies had DDoS mitigation solutions in place, they were not sufficient to protect their networks.

Read more

The Current State of DDoS Attacks: Are They Getting Smarter?

There has been a flurry of DDoS reports in the last few months, highlighting the evolving state of DDoS threats and warning of an upcoming wave of even bigger and more dangerous attacks. The sheer number of vulnerable connected devices out there, combined with the hacker community’s unrelenting ability to find new vulnerabilities to exploit, has significantly increased the potential scale of DDoS attacks.

Read more

How Improving Password Security Helps Protect Against Botnets

The DDoS threat landscape has been transformed by the emergence of Internet of Things botnets. Password hygiene of consumer and industrial IoT devices is often lax leading to easy criminal exploitation and potentially devastating attacks. The exponential growth in the number of IoT connected devices is a key driver in the ever increasing scale of the largest DDoS attacks.

Read more

Botnet-driven DDoS Attacks Represent a Developing Cyberthreat

Security researchers recently discovered a new variant of the famous Hide and Seek (HNS) botnet, which infected nearly 90,000 unique devices from the time of its discovery at the start of the year. The botnet, the world’s first to communicate via a custom-built peer to peer protocol, has now also become the first IoT malware strain that, under certain conditions, can survive a device reboot and remain on infected devices after the initial compromise.

Read more

Minding Your MANRS

Maintaining the resilience and stability of the global Internet requires collaborative efforts between Internet Service Providers (ISPs), government agencies, enterprises, security vendors and end users.

Read more

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

New DDoS Protection for Physical or Virtual Environments

Corero recently launched the SmartWall Network Threat Defense - Virtual Edition (vNTD), which brings real-time DDoS attack visibility and mitigation to virtualized environments, for more diverse, flexible deployment possibilities.

Read more

How to Handle DDoS Attacks: A Critique of DDoS Myths

A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.

Read more

The Importance of DDoS Attack Visibility

As sophisticated DDoS threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. Analysis of past events is valuable to help prepare for future threats.

Read more

DDoS-for-Points: How to Beat Hackers at Their Own Game

DDoS attacks are popular among online game players, and recently a Turkish hacker created a game that rewards players for launching DDoS attacks against a set of political websites.

Read more

Sub-Saturating DDoS Attacks Steal Bandwidth

Sub-saturating, surgical DDoS attacks can be a threat to any organization, but the impact on Service Providers can be even greater.

Read more

6 DDoS Attack Protection Myths

Having been in the business of DDoS protection for many years, Corero has seen plenty of bad advice thrown around by various cyber pundits. Below we have put together 6 common myths around DDoS protection, and our response to them.

Read more

Online Gaming Companies are EA-sy Targets for DDoS Hackers

Recent DDoS attacks on Blizzard and EA servers highlight the vulnerability of the online gaming industry. Fortunately, gaming companies— or, for that matter, all companies that rely on a continuous online presence— now have better choices that can deliver near-instantaneous protection.

Read more

Strategies Shifting for DDoS DNS Amplification Attacks

New research presented at the Black Hat conference indicates that DDoS DNS amplification attacks are now more likely to use SSDP than NTP, and that DDoS attacks may generally be smaller than are commonly reported.

Read more

Automated DDoS Protection Hardware Fills a Gap in Network Security

There is no shortage of cyber threats, but there is a shortage of trained IT security personnel to guard against them. With automated DDoS mitigation in place, IT security staff would have more time to handle other cyber security threats.

Read more