What do successful pentesting attacks have in common?

In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast majority of companies, there were multiple vectors in which an attacker could reach the internal network. Full control of infrastructure was obtained on all tested systems in internal pentesting. In addition, the…

Cybercriminals Exploit Gmail Feature to Scale Up Attacks

Some cybercriminals are taking advantage of a long-standing feature in Google Gmail designed to enhance account security, to create multiple fraudulent accounts on various websites quickly and at scale, security vendor Agari said this week. The feature, which some have warned about previously, basically ensures that all dotted variations of a Gmail address belong to…

Massive DDoS Attack Generates 500 Million Packets per Second

Distributed denial-of-service (DDoS) c do not have to be bandwidth-intensive to be disruptive and hard to mitigate. Earlier this month, Imperva mitigated an attack against one of its clients that exceeded 500 million packets per second, making it possibly the largest DDoS attack by packet volume ever recorded. The January 10 attack was a so-called…

SSDP amplification attacks rose 639%

The Nexusguard Q3 2018 Threat Report has revealed the emergence of an extremely stealthy DDoS attack pattern targeting communications service providers (CSPs). This new vector exploits the large attack surface of ASN-level (autonomous system number) CSPs by spreading tiny attack traffic across hundreds of IP addresses to evade detection. The ongoing evolution of DDoS methods…

Cryptomining Continues to Be Top Malware Threat

Enterprise organizations appear unlikely to get respite from cryptomining attacks anytime soon if new threat data from Check Point Software is any indication. For the thirteenth month in a row, attacks involving the use of cryptomining malware topped the security vendor’s list of most active threats worldwide in December. Malware for mining the Coinhive cryptocurrency…

Security analytics to reach $12 billion by 2024

Amid a maelstrom of cybersecurity threats and rampant hacking attempts that leverage the power of the IoT against itself, organizations are forced to realize that they are on the losing side of this war. As such, market vendors have no choice but to enhance their cybersecurity arsenal with more sophisticated tools which allow a deeper…