A distributed denial-of-service attacker who crashed a popular gaming service at Christmas has been sentenced to serve 27 months in prison. Austin Thompson has also been ordered to pay $95,000 in damages to Daybreak Games.
At this week's Information Security Media Group Fraud & Breach Summit in Bengaluru, India, national cybersecurity coordinator Lt. Gen. (retired) Rajesh Pant spoke about the challenges facing the country over the coming years.
Traditionally, enterprises have built networks and then added security elements. But in what he describes as "the third generation of security," Fortinet's John Maddison promotes a model of security-driven networking. Hear how this can improve an organization's security posture.
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive's technology is helping these organizations stay ahead of advanced attackers.
Download this report to learn how...
For the first time, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public appearance to discuss how they collaborate, sharing a stage in Glasgow, Scotland, during the CyberUK conference. The Five Eyes alliance comprises Australia, Canada, New Zealand, the U.K. and U.S.
Four unprotected application program interfaces for JustDial, a local search engine in India, are leaking the personally identifiable information of its more than 100 million customers in real time, says an independent security researcher who discovered the vulnerability.
The government of Ecuador has been hit with millions of "cyberattacks" following its withdrawal of asylum protection for WikiLeaks founder Julian Assange and his arrest by British police last week, an Ecuadorian official says.
DDoS attacks are getting larger in size and shorter in duration at a time when multicloud environments, which lack a single point of monitoring, are becoming more common, says Ashley Stephenson, CEO of Corero Network Security, who offers risk management insights.
As cyberattacks get more sophisticated, there is a
growing need for detection and response to address
these emerging threats.
Download this eBook to learn more about:
The GandCrab and Emotet campaigns;
The need for more endpoint detection and response;
The EDR vs EPP debate.
Mirai, the powerful malware that unleashed unprecedented distributed denial-of-service attacks in 2016, has never gone away. And now a new version has been equipped with fresh exploits that suggest its operators want to harness the network bandwidth offered by big businesses.
Malicious bot attacks now account for nearly one-third of all Internet traffic. These attacks specifically target the web, mobile and API applications that power today's hyper-connected organizations that rely on the Internet to connect with customers and support business processes. The goal of these bad actors is...
Investing in a Security Orchestration, Automation and Response (SOAR) platform is a wise and highly strategic decision in combination with your Splunk deployment. But do you know what criteria you should consider when evaluating which SOAR platform to choose?
Download your complimentary copy of "The SOAR Buyer's...
More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off - and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to...