+1.813.321.0987
InfoSec Articles (05/09/2022 – 05/23/2022)

InfoSec Articles (05/09/2022 – 05/23/2022)

Over the past two weeks, we saw The CrowdStrike Falcon OverWatch™ threat hunting team has uncovered a new and highly sophisticated Internet Information Services (IIS) post-exploitation framework that CrowdStrike refers to as IceApple. Also, 254% increase in activity...
Threat Intelligence: Essential For Your Cyber Defenses

Threat Intelligence: Essential For Your Cyber Defenses

Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top 5 business concern for 79% of companies globally (and the top risk for 22% surveyed). Threat...
Spoofed DDoS Attacks and BCP 38

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection...
DDoS: What is a Reflection and Amplification Attack?

DDoS: What is a Reflection and Amplification Attack?

    Updated on 06/13/2022 DDoS – What is it? A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious actor seeks to disrupt normal traffic of a targeted server, service, or network by overwhelming it with traffic. Brand...