There’s no such thing as a truly infallible system. Every platform, no matter how extensive or powerful, has points of failure. The Amazon Web Services outages we’ve seen over the …
With the advent of mobility and the coming Internet of Things, the enterprise threat surface has never been larger, nor the avenues through which criminals can gain access to essential …
Earlier this year, the IRS revealed that hundreds of organizations were (successfully) hit a spear-phishing attack. The target? Employee tax documents that included social security numbers, addresses, and wage information. …
The Distributed Denial of Service Attack has a long and storied history in the cybersecurity space. Originally based primarily on the TCP and UDP protocols, they’ve since expanded to new …
One of the oldest, most tried-and-true methods of defeating a DDoS attack is by blocking the IP addresses used to execute it. Unfortunately, criminals are acutely aware of that fact …
In a recent survey, Radware found that attacks that last only an hour or less are on the rise – and more than half of the three biggest attacks fell …
By now, digital crime has become so commonplace that news of a new attack is often met with the same level of excitement as a weather report. Unfortunately, this constant …
The days when you could be certain there was a human presence on the other end of a cyberattack are behind us. Bot-generated attacks targeted at web infrastructure have of …
No one is immune to cyberattacks. As technology continues to march forward and more critical data is stored online, more criminals than ever are targeting businesses through digital vectors. The …