Author: Kevin Whalen

The Economics of DDoS Attacks

These days, there are typically three parties to a distributed denial of service attack.

You probably know about two of them: the perpetrator and the target. Less well known is the vast and growing number of third-party providers of DDoS attacks as a service. Brazenly advertising their wares online, these providers will perform an attack on the customer’s behalf and provide detailed reports of their accomplishments. Their fees are shrinking due to rapidly expanding competition and the abundant supply of readily available attack resources, such as botnets. As a result, the DDoS attack business is very much a buyer’s market.

Read more

2017 DDoS Attack Activity

DDoS Activity in 2017
(through September 30th)

  • 272 days
  • 6.1 million DDoS attacks
  • 22,426/day
  • 934/hour
  • 15 per minute

As we approach the one year anniversary of the Dyn attack, it may seem like all has been quiet in DDoS land by comparison. After all, we have not seen major, multi-continent internet outage impacting many of the most popular online services and applications this year. That’s the good news. The bad news is, it’s not for lack of trying.

Read more

We’re All Going to Pay for Equifax

 

Much remains to be uncovered – or revealed publicly – about the breach of personal data at Equifax. One thing is certain: we will be hearing a lot more about Equifax in the coming months.

Unfortunately, the escalating threat environment and circumstances that led to the breach are not new. Just from what is apparent to date, it was the lack of appropriate coordination of technology, people and processes that resulted in the theft of 143 million personal records.

Read more

Post Exploit Visibility and the Need For Speed

Advanced malware is no longer the most dangerous enemy in the world of advanced threats. The new adversaries are human orchestrated attack campaigns — a series of hidden events engineered to create chaos. Improve your mean-time-to-detection and post-exploit visibility by looking within network traffic flowing […]

Read more