main

Security

Let’s discuss facts: An insight into Mirai’s source-code

November 3, 2016 — by Snir Ben-Shimol1

mirai-attack-2-960x608.jpg

In three massive DDoS attacks, Mirai botnet dazzled the cyber-security industry who long feared the implications of the exponentially growing number of devices connecting to the internet.

So many speculations, blogs and Op-Eds emerged following the attacks on Krebs, OVH and DynDNS. You couldn’t ignore them as everybody had something to say – speculation on who the attackers were, their motivation, the attack vectors and the traffic volumes. In this blog post, we would like to put an end to the speculation, and discuss facts.

Attack Types & VectorsSecurity

Today’s Cyber Security Threats in the Telecom Industry

March 23, 2016 — by Snir Ben-Shimol2

telecom-threats-2-960x698.png

Today the Telecom industries provide a wide array of global services that communicate with millions of customers.

This diverse business ecosystem is fraught with increasingly frequent cyber risks. It demands a commitment to cybersecurity that focuses on highly trained personnel, up-to-date solutions, and the right tools to detect, analyses, and respond to threats.