Tips to squash smishing (SMS phishing)

Tips to squash smishing (SMS phishing)

No matter how robust the network security infrastructure is, an error in judgment can open the floodgates for cyberattacks. Deceiving a user into revealing sensitive information, primarily over email, is called phishing ...
What is mobile security?

What is mobile security?

The use of smartphones has surged, but the users’ knowledge regarding the security of mobile devices has not kept pace with this uptick. To put things into perspective, a study claimed almost ...
Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...
What is ZuoRAT?

What is ZuoRAT?

ZuoRAT is a remote access trojan (RAT) that attacks small office/home office (SOHO) routers. On June 29, 2022, Black Lotus Labs, the threat intelligence arm of Lumen Technologies, revealed the existence of ...
Telco CyberTalk Podcast Episode 43 - The State of Consumer Security: Q1 2022

2.3 billion threats blocked: The state of the threat landscape Q1 2022

Allot Secure blocked 618% more malicious URLs in the first quarter of 2022 than the previous year. What’s in store for the rest of the year? What did the past few months ...
How to protect against the weakest link in cybersecurity – THE USERS

How to protect against the weakest link in cybersecurity – THE USERS

Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...
What was in store in the first quarter? Q1 2022 threat roundup

What was in store in the first quarter? Q1 2022 threat roundup

The threat landscape is as active as ever. This past quarter, Communication Service Providers that use Allot Secure saw several interesting new threats., including several threats that we thought had disappeared. Here ...
Why DDoS is still a major attack vector and how to protect against it

Why DDoS is still a major attack vector and how to protect against it

The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon ...
The biggest cyber threats among European CSPs

The biggest cyber threats among European CSPs

In the second half of 2021, adware exploded. This is explored in depth in the Allot H2 2021 Cyber Threat Report. The report found that, during the second half of 2021, Allot ...