Press & Media
In the news
Low-end booter and stresser distributed denial of service (DDoS)-for-hire services have given way to a thriving DDoS-for-hire botnet ecosystem primarily employing domain name system (DNS) amplification
By Jon Murphy, GVP-IT Security, Ocwen Financial Corporation – “Since DDoS attacks can be extremely complex, there is a need for multiple layers of defense in depth to be able to keep up with the latest threats. While you can hope you are not targeted, that is not a sound strategy. You should proceed as if you will be targeted or hit and take proactive steps now. So, with defense in depth in mind, let’s talk about 10 of those proactive steps, as a combination of strategy and tactics that you could take in advance.
1. Take assessment ..
2. Adopt a framework..
3. Incident response plan..
4. Solid router and firewall configs ..
5. Traffic threshold monitoring ..
6. Cloud based DDoS defense systems–lots of great vendors; check the think thanks for ratings and ask other colleagues for their experiences”
By Morgan Chalfant: “Japan and the United States recognize that automated large-scale distributed cyber attacks, such as through botnets, may pose a significant threat to cyberspace, in particular in the context of increasing connectivity through the Internet of Things (IoT),”
An individual or group claiming to be “Anonymous” or “Lizard Squad” sent extortion emails to private-sector companies threatening to conduct distributed denial of service (DDoS) attacks on their network unless they received an identified amount of Bitcoin. No victims to date have reported DDoS activity as a penalty for non-payment.
.. The most common DDoS mitigation option is a scrubbing center. In the event where an enterprise with a scrubbing center detects any DDoS traffic, they can choose to divert all their traffic–good and bad–to the nearest scrubbing center”