Why Cyber Attackers are Still Defeating Your Network Security Nearly, two years ago I questioned the myth: does size really matter? and now it’s time to revisit the issue… Ron Meyran | May 7, 2014
WordPress DDoS and other HTTP Reflectors Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm. The new kid on… David Hobbs | March 25, 2014
Was NATO Hit by a DNS Attack? The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the… Werner Thalmeier | March 24, 2014
To Err Human, To Automate Secure “To err is human.” This quote by British poet Alexander Pope gained new meaning to me after reading a follow-up… Motty Alon | March 20, 2014
DDoSed by the Troll For a large number of online gamers that planned to spend their holiday break playing online games such as League… Motty Alon | January 3, 2014
Personal Data – When the Invaluable Falls into the Wrong Hands Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security… Carl Herberger | December 9, 2013
A Perfect Cyber Storm: September 11th, Black Friday and Other Enticing Dates for Cyber Attacks After reading this article and piecing through the motivations of the hactivist group illustrated in the story, I couldn’t help… Carl Herberger | September 9, 2013
Distinguish between legitimate users and attackers – The secret sauce of DDoS protection Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests.… Ronen Kenig | June 18, 2013
Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013 Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of… Carl Herberger | June 14, 2013
Security Week Article: Next Generation Mobile Networks Come with Next Generation Security Threats This past weekend, Security Week ran a byline I wrote regarding Long Term Evolution (LTE). Although this brings the promise… Avi Chesla | June 11, 2013
Why Low & Slow DDoS Application Attacks are Difficult to Mitigate The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and… Ronen Kenig | June 10, 2013
ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack… Yaniv Balmas | April 19, 2013