+1.813.321.0987
InfoSec Articles (06/21/21 – 07/05/21)

InfoSec Articles (06/21/21 – 07/05/21)

Malware patrol selected some relevant news over the past 2 weeks. Microsoft has confirmed signing a malicious driver being distributed within gaming environments. “Netfilter,” a rootkit that was observed communicating with Chinese command-and-control (C2) IPs. Also,...
Threat Intelligence: Essential For Your Cyber Defenses

Threat Intelligence: Essential For Your Cyber Defenses

Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top 5 business concern for 79% of companies globally (and the top risk for 22% surveyed). Threat...
Infosec Articles (11/8/19 – 11/22/19)

Infosec Articles (11/8/19 – 11/22/19)

Ransomware takes the spotlight this time showing up targeting Windows users, production servers and, specifically, drives commonly associated with removable devices and mapped network drives. For more articles, check out our #onpatrol4malware blog. New Study: Hospital...
Spoofed DDoS Attacks and BCP 38

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and reflection...
DDoS What is Reflection and Amplification Attacks

DDoS What is Reflection and Amplification Attacks

  Updated on 06/13/2022DDoS – What Is?A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious actor seeks to disrupt normal traffic of a targeted server, service, or network by overwhelming it with traffic.Brand reputation,...