You searched for botnets | SC Media

Your search for botnets returned 91 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Opinions remove

Your search for botnets returned 91 results

Sort Results:

Relevant Recent
Executive Insight, Opinions

Bots Are an Existential Threat to Our Economy

By Tiffany Olson Kleemann, CEO, Distil Networks In 1998, “Titanic” became the first movie to gross $1 billion, the Michael Jordan-led Chicago Bulls won their sixth NBA championship, and President Bill Clinton was impeached but acquitted of wrongdoing in the Monica Lewinsky scandal. It also was the year when bots – pieces of software that run automated tasks over…
Executive Insight, Opinions

Automating for Endless zero-days

By Derek Manky, chief of security insights & global threat alliances, Fortinet The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6 percent were actually exploited in the wild. The challenge is that predicting which vulnerability…
Executive Insight, Opinions

Nation-states, terrorists place critical infrastructure in their cross-hairs

By Steve Durbin, managing director, Information Security Forum Over the coming years, the very foundations of today’s digital world will shake. Innovative and determined attackers, along with changes to the way organizations conduct their operations, will combine to threaten even the strongest establishments. Only those with vigorous preparations will stand tall. Nation states and terrorist…
Executive Insight, Opinions

How Online Gaming Companies Can Forecast & Protect Against DDoS

By Daniel Smith, head of security research, Radware’s emergency response team One of the most significant issues facing the online gaming industry is service availability as large-scale Distributed Denial of Service (DDoS) attacks are still an everyday occurrence. Unfortunately, denial of service attacks have always and will always be a part of the gaming culture,…
Executive Insight, Opinions

Winning the Botnet Wars

By Anthony Giandomenico, Senior Security Strategist and Researcher, FortiGuard Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions…
Opinions, Security News

Why You Should Automate Purple Team Assessments

You’ve invested a lot of time, money, and effort in cybersecurity and securing your organization. You’ve deployed firewalls, endpoint protection, intrusion prevention, and everything in between. Your decisions are driven by both established and trending cybersecurity best practices, combined with strong security policies and practices. Your networks, servers, endpoints, and data are secure. Or are…
Editorial Honeypot

The top 5 dumbest cyberthreats that work anyway and their solutions

There is a common thread when it comes to why the bulk of cyberattacks launched against businesses and the population at large manage to be successful even though they are not new, or even particularly inventive. The glue that holds these together is a combination of sticking with what works, regardless of how dumb or…
Editorial Honeypot

10 reasons why cybercriminals target smartphones

The researchers at ESET put together a 10-point list that does not paint the smartphone industry, nor their users, in a very favorable light when it comes to cybersecurity. While one possibly should not blame cybercriminals for taking advantage of lax security measures, after all that’s what cybercriminals do for a living, the list indicates…
Editorial Honeypot

Corporate America: Your employee passwords are mainly 123456 and qwerty

If corporate America has learned anything from the huge number of login credentials that were exposed in 2016 it’s that having a strong password is key. With that said it’s more than a bit depressing to come across a study like the one completed by Keeper Security listing the 25 most common passwords in use…
Peter Stephenson
The Threat Hunter Blog

Hunting DiamondFox Crystal on Your Enterprise

This week I am writing the blog jointly with a well-known threat hunter, Josh Liburdi from Sqrrl.  Josh has had a long career in threat hunting as you can see from his brief bio below so I asked him to take our sample, turn it loose in his sand box and tell us how he…
Next post in The Threat Hunter Blog