Advanced Cloud Security

Cyber threats have become more sophisticated. Hence, it is a good idea to utilize the expertise of public cloud providers to better manage assets against security threats. Cloud security is a collection of proactive measures to protect your cloud assets from internal and external threats. In this Refcard, we will walk through common cloud security challenges, continuous security for cloud infrastructure, and advanced strategies for securing cloud workloads.

Mirai Variant Dark.IoT Expands Reach Beyond IoT Devices to Linux Servers Hosted in the Cloud in Attempt to Increase DDoS Capability

Radware researchers have found that a Mirai variant in development since February 2021 has continued to evolve, making it more capable and dangerous than ever. 

Back in August 2021, Radware reported that a Mirai variant campaign known as Dark.IoT had begun leveraging a vulnerability, CVE-2021-35395, in Realtek's SDK just days after its disclosure. Researchers named the botnet Dark.IoT, based on the use of "Dark.[architecture]" filenames for its malware binaries and the reoccurring use of "lmaoiot" variations throughout its infrastructure naming. 

When Malware Abused Docker

Malware actors are increasingly setting their sights on Docker. Docker, as a PaaS platform, enables OS, firmware, and apps to run within a container. This enclosed environment benefits developers when they’re looking to try out code. However, it also grants nefarious individuals a way to spawn a malware infection within an organization.

It’s therefore no surprise that malicious actors have abused Docker containers over the past several years. Here are just a few malware incidents that stand out.

How Zero Trust Architecture Keeps Your Data Safe

Just as every rose has approximately 23.5 thorns, every business innovation gives rise to an array of cybercrimes designed to exploit it. As we become a more connected world — sharing data and processes, sending live communications over mountains and oceans, and logging on to apps hosted across any number of nations — nefarious threats rise to meet our best intentions.

It's no wonder Cybersecurity Ventures predicts that, by 2021, businesses will fall victim to a ransomware attack every 11 seconds.

Writing About Security [Prompts]

Ever struggle with what to write? No worries, we've got you covered. Here's a list of security prompts and article ideas to help cure even the worst cases of writer's block. So, take a moment, check out the prompts below, pick one (or more!), and get to writing.

Also, please feel free to comment on this post to bounce around ideas, ask questions, or share which prompt(s) you're working on. 

Defending Against TB-level Traffic Attacks With Advanced Anti-DDoS Systems

A Brief History of DDoS Prevention

Distributed Denial of Service (DDoS) uses a large number of valid requests to consume network resources and make services unresponsive and unavailable to legitimate users. Currently, DDoS attacks are one of the most powerful cyber-attacks to defend against.

DDoS has been around the cybersecurity world for a long time and is an old attack method. DDoS prevention has also undergone different stages.

Everything You Need to Know about DDOS: What Is a DDOS Attack?

Distributed Denial of Service, also commonly abbreviated to DDOS, is a cyber attack made infamous by movies and the Internet. Simply put, it is a situation where any sort of service is being denied. In this “what is DDOS attack” article, I will give a comprehensive explanation of how this particular attack works and also go over its different types. Lastly, I will also demonstrate how you could perform your very own DOS attack on a wireless network. 

What Are DOS and DDOS?

To understand what a DDOS attack is, it is essential to first understand the fundamentals of a DOS attack.

3 Ways Securing Your APIs Just Got Easier

Keeping up with hackers is a time-consuming business. Those with malicious intent always seem to be a step ahead — or at least close behind — the latest vulnerabilities.

Because of the access to data and application functionality they provide, APIs hold the potential to be the chink in your security armor. And API security best practices are increasingly under review as a result.