XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)

XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)

Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils (CVE-2024-3094), with a CVSS score of 10. Since the underlying layer of SSH relies ...
Get Unmetered, Layer 3-7 DDoS Protection

DDoS Traffic Analysis Techniques for SOC Teams

Equip your SOC team to analyze and counter application layer DDoS attacks for enhanced security. Explore key strategies for DDoS attack traffic analysis here. The post DDoS Traffic Analysis Techniques for SOC ...
4 Ways To Categorize Web DDoS Tsunami Attacks — Part 2

4 Ways To Categorize Web DDoS Tsunami Attacks — Part 2

There is an array of dimensions that can be used to characterize botnets launching Web DDoS Tsunamis floods. The following are dimensions relevant primarily for attack detection and mitigation. Other dimensions (like ...
4 Ways To Categorize Web DDoS Tsunami Attacks — Part 1

4 Ways To Categorize Web DDoS Tsunami Attacks — Part 1

It’s probably not news that the amount and frequency of cyber-attacks is rising precipitously. And one type of attack, the Web DDoS Tsunami, represents a notoriously large component of this growth. At ...
Fundamentals of DDoS Risk Mitigation

Top 15 DDoS Protection Best Practices

Irrespective of the business size or location, DDoS attack protection programs are mandatory today. Here are 15 best practices that will help you. The post Top 15 DDoS Protection Best Practices appeared ...

5 Things to Consider if You Need Ongoing DDoS Protection

Here are the first things that come to mind when many people think of a DDoS attack: Unsophisticated, the oldest trick in the book, not harmful, “I am not at risk”, and ...

How to Find Extra Cybersecurity Budget

Risk is up and budgets are down Organizational cybersecurity is a business issue, one could even say a finance issue, not just an IT issue. Gone are the days when cybersecurity was ...
DDoS Protection in the Age of 5G Networks, Edge Computing and Explosive Bandwidth Growth

DDoS Protection in the Age of 5G Networks, Edge Computing and Explosive Bandwidth Growth

Service providers need a DDoS security solution to support new infrastructure innovations while overcoming the explosive growth in DDoS attack intensity and sophistication of phantom flood attacks. The post DDoS Protection in ...

What to Include in a Cybersecurity Disaster Recovery Plan

If the unthinkable were to happen to your business, what’s your disaster recovery plan? If bad actors were to inject ransomware into your system, what’s your process for a return to normal ...

2021 in Review, Part 4: 5 Cybersecurity Topics to Watch in 2022

One of the core principles of cybersecurity is not letting things “slip through the cracks”. An effective security posture depends on visibility. The more visibility you have into the environments where your ...