Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Earth Preta’s Cyberespionage Campaign Hits Over 200” This study on an active cyberespionage campaign delves into the structure, goals, and...
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Researchers Uncover 700+ Malicious Open Source Packages”. Also, you will see the “CISA and FBI Release ESXiArgs Ransomware Recovery...
Over the past two weeks, we saw The CrowdStrike Falcon OverWatch™ threat hunting team has uncovered a new and highly sophisticated Internet Information Services (IIS) post-exploitation framework that CrowdStrike refers to as IceApple. Also, 254% increase in activity...
Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top 5 business concern for 79% of companies globally (and the top risk for 22% surveyed). Threat...
The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection...
Updated on 06/13/2022 DDoS – What is it? A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious actor seeks to disrupt normal traffic of a targeted server, service, or network by overwhelming it with traffic. Brand...