Cyberattack

Cyberattack / Most Viewed

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 1

Many cyber attacks against companies today go unreported, and more still are undetected... Timing and context are everything. The faster a company identifies a problem, and the faster and deeper it is understood and its relevance to the business, the more effectively the company can respond. We call this squeezing the cyber response curve. This two-part post will discuss the current state of cyber threats, what the cyber response curve is and its impact your organization and how you can effectively squeeze this curve to improve attack response. more

Paris Cyber Agreement Has Grown to More Than 450 Signatories

The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more

No Apparent Financial or Political Motivation Behind Dyn DDoS Attacks, Says Intelligence Firm

In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with "a moderate degree of confidence" that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors. more

Russia Is Studying China’s Legislative Experience in Fighting Internet Corruption, Cyber-Terrorism

Russian State Duma deputy, chairman of the Committee on Security and Corruption Control Vasily Piskarev told Russian reporters on Tuesday that Russia is studying China's legislative experience in dealing with corruption, cyber-terrorism and cross-border crime on the Internet. more

Best Practices for Implementing IPv6 and Avoiding Traffic Exposures

There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks. As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. more

South Korean Ruling Party Chief Offers Resignation Amidst DDoS Scandal

South Korea's ruling party chairman has offered to resign over a cyberattack reported to have been orchestrated by an aide to one of the conservative party's lawmakers. The move comes after police concluded the distributed denial-of-service (DDoS) attacks on the election watchdog's website on the day of by-elections in October was masterminded solely by a 27-year-old aide to the ruling Grand National Party. The aide has also admitted to orchestrating a similar cyberattack on the website of Park Won-soon, who was elected Seoul mayor in the Oct. 26 elections. more

Testing, Testing, Testing for a More Secure (Internet) World

Reading up on COVID-19 and Zoom/Boris Johnson outcry yesterday, an analogy struck me between the two: the lack of testing. In both cases, to truly know how safe and secure we are, testing needs to be stepped up considerably. This post focuses on cybersecurity. Over the past days and weeks, more and more organisations have switched to digital products and services to sustain working from home, to keep productivity up and to be connected. more

US Congress Website Recovers from a Crippling 3-Day DNS Attack

A number of websites owned and operated by the United States Congress are recovering from a three-day DNS attack. more

Massive Data Breach Hits HCA: 11 Million Records Compromised

In what is currently the largest healthcare industry data breach, Hospital Corporation of America (HCA) has confirmed the theft of 11 million patient records. HCA, one of the country's most prominent healthcare providers, believes the breach originated from an external storage system used for email automation. more

Chinese Hackers Had Access to Canadian Government Systems for Years, Report Reveals

For five years, Canadian government networks have been vulnerable to Chinese state-sponsored cyber espionage, according to a recent report by Canada's Communications Security Establishment (CSE). more

Can Hybrid DDoS Mitigation Stop Large Application Layer Attacks?

We recently received an email from a customer asking about hybrid DDoS mitigation and its ability to stop large application layer attacks. Here's the truth: Hybrid DDoS mitigation works and can stop large application layer attacks. Hybrid DDoS mitigation typically involves a purpose-built DDoS mitigation appliance or software on dedicated hardware that sits immediately in front of or behind an enterprise's edge router. more

Research Group Releases International Law on Cyber Warfare Manual

The newly released handbook applies the practice of international law with respect to electronic warfare. The Tallinn Manual on the International Law Applicable to Cyber Warfare -- named for the Estonian capital where it was compiled -- was created at the behest of the NATO Co-operative Cyber Defence Centre of Excellence, a NATO think tank. It takes current rules on battlefield behaviour, such as the 1868 St Petersburg Declaration and the 1949 Geneva Convention, to the internet, occasionally in unexpected ways. more

Emergency Patch Issued for Samba, WannaCry-type Bug Exploitable with One Line of Code

The team behind the free networking software Samba has issued and emergency patch for a remote code execution vulnerability. more

Pyeongchang Olympics Organizers Investigating Possible Cyberattack on Opening Day

Reports from various sources indicate Pyeongchang Olympics organizers were looking into a disruption of non-critical systems on the day of the opening ceremony but could not yet confirm if it was a cyberattack. more

Former New York City Mayor Rudy Guliani Appointed to “Chair” Cyber Task Force

Transition spokesman Sean Spicer told reporters today that former New York City Mayo, Rudy Giuliani will "chair" the cyber task force that Trump announced last Friday. The task force is given three months from Trump's inauguration to deliver a cybersecurity plan. more