Month: February 2016

DDoS – Best option to get the job done!

February 26, 2016

Track:  Technical

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

ddos defense In the world of getting from one place to another, people face a common dilemma.  What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best option to get the job done.  Something that is reliable, efficient, easy to operate, and affordable. No one likes paying too much. Interestingly enough, a parallel can be drawn in the context of DDoS defenses and the solutions NSFOCUS provides to the cyber-security community. (more…)

When Malware Becomes a Service, Anyone Can Be a Hacker

February 25, 2016

Gadgets 360 A DDoS attack, one of the most popular available attacks has been offered as a service commercially to anyone interested by hacking group. Our senior technical expert Vann Abernethy said “Distributed Denial of Service attacks have been around for a while now, and each year they grow in size, number, and sophistication. We […]

DDoS attacks: how to mitigate these persistent threats

February 25, 2016

CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]

Downstream networks detect Wendy’s breach

February 25, 2016

The Green Sheet Numerous consumers who used credit cards at Midwest and Northeast locations of The Wendy’s Co. in the latter part of 2015 were notified by their card issuing banks of a potential data security breach. Company spokesman Bob Bertini advised news media that fraudulent charges began to appear elsewhere after the cards were […]

Was Hollywood Presbyterian ransom attack preventable?

February 23, 2016

MedCity News The hackers who brought down the computer network and connected medical devices at Hollywood Presbyterian Medical Center in Los Angeles have taken healthcare cyberattacks to the next level, according to a maker of network security technology. The hackers are demanding a ransom of 9,000 Bitcoin, equivalent to about $3.6 million, to unlock the […]

Phony CloudFlare DDoS page redirects victims to Nuclear EK

February 18, 2016

SC Magazine CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer […]

Building a better defense – tech, people, process

February 17, 2016

Track:  Technical

Author: Vann Abernethy, Field CTO, NSFOCUS

matrix-69681_1920When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally people around that. (more…)

Massive Brute-Force Attack on Alibaba Affects Millions

February 10, 2016

InfoSecurity  Up to 21 million accounts on Alibaba e-commerce site TaoBao may have been compromised thanks to a massive brute-force attack. Dave Martin, our security expert and director said that some of the accounts were compromised because of overlapping passwords but there were likely many accounts stolen due to weak passwords that were defeated using […]

Utilities Lack Visibility to Prevent All Attacks, Research Shows

February 10, 2016

eWeek As reports of attacks against energy utilities emerge, there is some evidence that they aren’t properly secured, two separate studies show. NSFOCUS report analyzed that the malware which has been implicated in the Ukraine outage shows that the attack didn’t necessarily use an exotic zero-day vulnerability. The report concludes that a Trojan called BlackEnergy […]

Costly government cybersecurity system needs major changes

February 10, 2016

TechTarget Search Security A new report on the EINSTEIN government cybersecurity system concluded that it is only “partially meeting its stated system objectives,” and needs some major changes. The report comes from the U.S. General Accountability Office (GAO) and had some startling revelations, including that the National Cybersecurity Protection System(NCPS), operationally known as EISTEIN, is […]

Search

Subscribe to the NSFOCUS Blog