This post is also available in: Inglês Francês Alemão Italiano Espanhol Russo

Pascal Geenens

55 POSTS0 COMMENTS
As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

O que leva a ataques DDoS e por que isso deve ser uma preocupação

DDoS significa ataques de negação de serviço distribuído. Vamos ignorar o Distribuído por enquanto, já que se refere principalmente à técnica e vamos focar primeiro na Negação de serviço. Como o próprio termo indica, o objetivo de um ataque DoS é interromper ou negar serviços de usuários legítimos.

Ransomware e DoS de resgate, por que são semelhantes, porém diferentes

Embora o ransomware e o DoS de resgate tenham um objetivo comum e algumas de suas táticas se sobreponham, suas técnicas e taxa de sucesso são bem diferentes, assim como a ameaça e o impacto potencial para as organizações. Com o tempo, à medida que as duas ameaças evoluíram, elas foram aproveitando a reputação e as técnicas cruzadas.