For as little as a few dollars, cyber criminals can purchase DDoS services on the dark web that are capable of delivering larger hybrid attacks. In today’s digital world its […]
The common tools, techniques and procedures that attackers are using
Cyber attackers are continually developing their capabilities and techniques, using various methods to achieve their malicious intent. Even though their tools and tactics are continuing to evolve they haven’t abandoned […]
Why e-commerce needs DDoS protection
As Black Friday and Cyber Monday increase in popularity and the Christmas shopping rush lead to more people shopping online, businesses need to ensure that they are ready and able […]
Meet the new face of cyber security: deception technology
As a concept, deception technology has been used for many years within the intelligence and defence communities. The idea of tricking someone into thinking that they are in full control […]
Security Vulnerability Continues to Skyrocket
Neustar has released two new cybersecurity reports, reconfirming the need for organisations to take action in the face of increasing cyber threats. Both reports, The International Cyber Benchmarks Index and […]
Memecached DDoS: The new cyber attack on the block
It’s no secret that DDoS attacks are becoming more frequent and increasingly vicious. They are now capable of changing and evolving at such a rapid rate that many IT managers […]
Stuck in the middle: how ‘grey websites’ highlight the importance of DNS decision-making
According to a recent Neustar survey, 82 per cent of APAC-based organisations reported experiencing at least two DDoS attacks within the past 12 months, and nearly 45 per cent being […]
Don’t forget to lock the door: How conducting a DNS audit can protect your business from cyberattacks
As the incidence of DDoS (Distributed Denial of Service) attacks continue to grow exponentially it’s vital that businesses regularly audit their DNS (Domain Name System). Using a piecemeal “set and […]