Custom defence in the age of an inevitable breach
CSO Trend Micro Workshop
30 Aug | View galleries
Distributed denial of service (DDoS) specialists can shut down an attack in 90 seconds once it’s detected – but if you take more than 3 hours to respond you’re likely to be compromised by a related attack in the meantime, warns a security expert who is seeing easy-to-source DDoS attacks becoming smokescreens for brazen data theft.
David Braue | 17 Oct | Read more
Ransomware that targets specific businesses and spreads itself using worm-like techniques were game changers this year as ransomware authors shifted focus to the business community in attacks that now cost an average ransom of $US544 ($A684) per endpoint, new research has warned.
David Braue | 02 Sep | Read more
In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets.
A disgruntled former employee, used off-the-shelf tools to destroy files and cause mayhem for Navarro Security
Christopher Burgess | 11 Jul | Read more
Hackers once again use legit Apple Developer ID to sign malware for Mac computers.
This paper looks at the basics of DNS services, how they can be compromised, how to secure them more effectively and how an organization can actually use them as an asset to improve its security posture.