Articles for Security

Technique Discovered That Can Mitigate Memcached DDoS Attacks

This mitigation technique relies on the attacked victim sending a "flush_all" command back to the attacking servers

Read More
eSentire Threat Intelligence Advisory: Memcached-Based DDoS

eSentire assesses with medium confidence that memcached-based DDoS attacks pose an immediate threat

Read More
GitHub hit by Most Powerful DDoS Attack

Servers flooded with 2 TeraBytes per second of data

Read More
"Spring Break" - Critical Security Vulnerability Found!

Hackers are looking for low hanging fruit, and understanding how important the gap between the discovery of a serious defect and taking action is essential

Read More
GitHub hit with Largest DDoS Attack ever Recorded

ISPs need to block spoofed packets from exiting their networks

Read More
Gemalto Enables Swift and Secure Creation of Trusted Digital Identities

The company's expertise in biometric technologies and secure identity documents ensures rapid and reliable verification

Read More
F-Secure intros Unique Partner-driven Service to Stop Targeted Cyber Attacks

Channel partners have immense new service opportunities to protect their customers from rising numbers of targeted and fileless attacks

Read More
Trend Micro Warns of GDPR Extortion Attempts from Strategic Cybercriminals

Cybersecurity roundup report reveals growth in targeted, strategic, money-making attacks

Read More

Stay in the know with our newsletter