botnet

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The largest DDoS attacks have increased greatly in strength, doubling in attack size during 2016. They are bigger, more complex, and require more expertise to defend against than past Distributed Denial-of-Service (DDoS) attacks. They are not limited to a specific industry.
Tags : 
mira botnet, cyber attack, ddos, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 05, 2018
DDoS attack size doubled in early 2018 after attackers discovered and employed a new, massive DDoS reflection and amplification method with the potential to multiply their attack resources by a factor of 500K. The attack vector, called memcached UDP reflection, uses resources freely exposed on the internet — no malware or botnet required.
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Published By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : 
ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus
    
Arbor Networks
Published By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : 
ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats, anti virus
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
Because of the damage they cause and the bewildering speed with which they mutate, botnets are perceived as malevolent and unstoppable. Fortunately there are companies such as Arbor Networks, which are dedicated to analyzing and stopping botnets.
Tags : 
anatomy of a botnet, botnet, ddos, global basis, distributed denial of service, analyzing, service, arbor networks
    
Arbor Networks
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
    
Astaro
Published By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : 
cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications
    
BitSight Technologies
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 09, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
    
Cisco Umbrella EMEA
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet
    
Entrust Datacard
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack
    
ESET
Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware, botnets, malware, social engineering
    
ESET
Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware, anti spyware
    
ESET
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.