The most recent content from our members.
We've started to use NetFlow in NPM, which has been very helpful in identifying DDoS attacks on our network. I'm interested if it's possible to set up an alert that would monitor for specific parameters that could indicate a DDoS, such as a single IP address receiving traffic from more than three different countries within…
In part 1 of this series we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you determine the size and shape of the current information security landscape, and where you and your organization are within it. We also realized that…
With the continuous increase in the number of security breaches every year, it would we critical for you to take a closer look at the few things that you can do from an IT security standpoint, to minimize the risks. One of the key steps towards this complying with industry specific regulations like SOX and HIPAA/HITECH and…
As IT professionals, we have a wide variety of tools at our disposal for any given task. The same can be said for the attackers behind the increasing strength and number of DDoS attacks. The latest trend of hijacked IoT devices, like the Mirai Botnet, deserve a lot of attention because of their prevalence and ability to…
Ensure your IoT devices are secure, or face the consequences. That’s the message being sent to some hardware manufacturers by the Federal Trade Commission. In the aftermath of the ever-increasing number of attacks perpetrated by compromised IoT devices like routers and cameras, the Federal Trade Commission’s Bureau of…
Nobody is safe. From the highest tier service provider to a small business network in rural Iowa, every network is susceptible to a massive scale DDoS attack. Whether as a direct target of the attack, or indirectly as critical services are affected elsewhere on the internet. In my previous article, DDoS and the Broken…
In my previous two posts, DDoS and The Broken Internet and The Internet of Hacked Things, we discussed how there are some critical flaws in key services and internet infrastructure that easily allow attackers to cripple large portions of the internet, as well as highlighting how IoT is really the Internet of Vulnerable…
You may be a Network Administrator for a small law office, or a quiet small-town school district, or even a midsize enterprise with three or four offices scattered throughout a relatively small geographical area. Have you ever stopped and wondered if a cyber-attack was something you had to be concerned with? You’re not a…
Summary: How big the botnet problem is, how it can affect your network and how traffic and log analysis can help slay the botnets in your network. As a network administrator, you may have implemented security measures to stop DDoS attacks and upped the ante against malware. You may have your firewalls, ACLs, and Intrusion…
It was recently found by CERT that there’s a new type of DDOS botnet that is infecting both Windows and Linux platforms. This is a highly sophisticated cross-platform malware which impacts computers by causing DNS amplification. WHAT IS DNS AMPLIFICATION? A DNS Amplification Attack is a Distributed Denial of Service (DDOS)…
It looks like you're new here. Sign in or register to get started.