2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks. We saw sensational attacks on APIs, the ability ...
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

TL;DR Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The geographic spread of vulnerable servers and the targets ...
The Origin of Ransomware and Its Impact on Businesses

The Origin of Ransomware and Its Impact on Businesses

In previous articles we’ve mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll start with the basics and describe what ransomware ...
IoT Botnets on the Rise

IoT Botnets on the Rise

Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload delivery and began focusing on exploiting IoT devices for the purpose ...
The Evolution of IoT Attacks

The Evolution of IoT Attacks

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over the internet. If the cloud is considered someone ...
Free DNS Resolver Services and Data Mining

Free DNS Resolver Services and Data Mining

Why would companies offer free DNS recursive servers? DNS data is extremely valuable for threat intelligence. If a company runs a recursive DNS for consumers, it can collect data on new domains ...
Top Cryptomining Malware. Top Ransomware.

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by cybercriminals doing their best to develop innovative ...
Malicious Cryptocurrency Mining: The Road Ahead

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to make the most out of their resources to ...
Can SNMP (Still) Be Used to Detect DDoS Attacks?

Can SNMP (Still) Be Used to Detect DDoS Attacks?

SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component in many networks for monitoring the health and resource utilization of devices ...
Raising the Bar for Ethical Cryptocurrency Mining

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will continue the discussion, explain what ethical mining is ...
Loading...