Category: Kamban
Years ago, I worked on a consulting project for a large financial services company, which had recently invested $20 million into their core offering, a managed services platform for financials that was used by hundreds of customers. We did a Failure Mode Effect Analysis for them, looking at every component making up the major service—every…
Read MoreEMEA’s mainstream media’s spotlight on ransomware attacks may have dimmed over the last 18 months but that doesn’t mean the threat has disappeared. There is certainly no room for complacency, and we would do well to pay attention to recent events across the pond. Far from diminishing in disruptive impact, ransomware attacks appear to have…
Read MoreSecurity researchers at F5 Networks constantly monitor web traffic at various locations all over the world. This allows us to detect “in the wild” malware, and to get an insight into the current threat landscape. In December 2019, security researchers detected a 100% increase in new threat campaigns as compared to November 2019. This was…
Read MoreDo Gen Z-ers (individuals age 8 to 22) think and behave differently towards technology than previous generations? Specifically, are their attitudes and digital habits around privacy and security different from Millennials (age 23 to 35), who grew up with less technology? What about compared to Gen X-ers (age 36 to 55)? When F5 Labs was…
Read MoreAfter a few days of monitoring the channel, the bot master noticed our activity and registered the nicknames of the admins and white-listed the IRC clients allowed to join the network. This prevented us from pretending to be admins and controlling the bots. During our research, the botnet peaked at around 350 bots, which is…
Read MoreF5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyber threat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports…
Read MoreAttack Types of Top Attacking IP Addresses Many of the IP addresses attacking Russian systems during the winter of 2019 were involved in abusive port scanning activity. As noted in the top attacked ports section, Microsoft SMB on port 445 was the highest targeted port, and that was seen across all of the top attacking…
Read MoreF5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyberthreat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports expose…
Read MoreImagine not being able to escape online surveillance. The Internet of Things (IoT) is composed of technology that optimize our lives and is deployed in the thousands. However, the convenience these devices add to our lives comes at a cost—privacy. In 2019, China had more than 960 million IoT devices, many of them surveillance cameras, making…
Read MoreAuthentication Attacks: Growing Every Year Credential stuffing and brute force attacks have been the biggest threats for financial services recently, and the trend shows no sign of slowing. This is unsurprising, given the capability that legitimate credentials represent for attackers. If attackers are able to guess or simply re-use already compromised credentials and gain access…
Read MoreRecent Posts
- Google Cloud Hires Tech Superstar Francis DeSouza As New COO
- AWS Invests $11B In Georgia To ‘Support The Future Of AI’ Via Data Centers
- Google’s Willow Quantum Chip and Its Potential Threat to…
- Citrix Parent Cloud Software Group Confirms Layoffs
- Nvidia Seeks To Turbocharge AI PC Development With GeForce RTX 50 GPUs