Home Blog Page 82

This DDoS Attack Unleashed the Most Packets Per Second Ever. Here’s Why That’s Important.

DDoS attacks are usually measured by the amount of bandwidth involved, such as the 1.35 Terabits per second (maximum) attack directed at GitHub last year, the largest DDoS attack ever at the time. However, in DDoS attack mitigation, it’s not the amount of bandwidth that matters – it’s the absolute number of packets directed at a network or web site....

Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

Executive Summary Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation. This malware has previously been associated with an APT actor that...

Meet the New Imperva – Defending Your Business Growth Today and Tomorrow

Today’s Imperva is a champion in the fight to secure data and applications, wherever they reside. The threat landscape is dangerous and ever-changing, but our thousands of customers know they can count on Imperva to protect them. No wonder our solutions are recognized as leaders by analysts such as Gartner and Forrester Research.   However, security is changing. It’s no...

FISMA SI-7 Buyers’ Guide

FISMA SI-7 Buyers' Guide #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; } body,#backgroundTable{ background-color:#ffffff; }...

Seven Must-Dos to Secure MySQL 8.0

Most database breaches are blamed on insiders such as employees who are either malicious or whose security has been compromised. In fact, most of these breaches are actually caused by poor security configuration and privilege abuse. Every new database version brings security upgrades. Use them appropriately and your organization can secure its data and keep you out of trouble. MySQL...

Latest article

US dominance of agentic AI at the heart of new NIST initiative

This week, the US National Institute of Standards and Technology (NIST) announced a new listening exercise, the AI Agent Standards...

Using AI to defeat AI

Welcome to this week’s edition of the Threat Source newsletter.  Generative AI and agentic AI are here to stay. Although I believe that the advantages...

Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen

Adidas has confirmed it is actively investigating a potential data breach involving one of its independent third-party partners after a threat actor operating under...

Remcos RAT Expands Real-Time Surveillance Capabilities

New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows - Read more