Blog / Jun 14, 2018
Singapore saw a sharp rise in attacks targeting a variety of ports, from SIP clear-text (5060), Telnet, SQL, and host-to-host ports to those used for remote router management and proxy servers and caching.
Blog / May 4, 2018
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
Article / Apr 6, 2018
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.
Blog / Mar 22, 2018
Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.
Report / Mar 13, 2018
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
Blog / Mar 2, 2018
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
Blog / Jan 31, 2018
Critical lessons can be learned from others’ mistakes. Don’t learn the hard way; heed the warnings from our research.
Article / Sep 14, 2017 (MODIFIED: Oct 17, 2017)
TrickBot released a new worm module, shifted its focus towards the US, and soared past the one thousand target URLs mark in a single configuration.
Article / Jul 27, 2017 (MODIFIED: Sep 1, 2017)
As TrickBot evolves, we examine version 24, which heavily targets Nordic financial institutions, and we take a close look at the Dyre–TrickBot connection.
Blog / Jun 15, 2017 (MODIFIED: Aug 1, 2017)
TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting providers’ networks.
Report / May 10, 2017 (MODIFIED: Aug 7, 2017)
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
Blog / Mar 3, 2017 (MODIFIED: Jul 25, 2017)
Putting off fixing low-severity vulnerabilities can have high-impact effects.
Article / Jul 22, 2016 (MODIFIED: Jul 6, 2017)
Customer engagement drives web application design, but user-generated content brings inherent security challenges.