Hacks

Growing Your Business: Security as an Expectation

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear...

Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security

It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains a major...

Network Security Does Not Matter When You Invite the Hacker Inside

We build security solutions to protect our networks from the rest of the internet, but do we do anything to protect the network from...

Is Heat Your Thermostat’s First Priority?

Mirai has been popping on and off the news and is becoming a commodity resource for large scale DDoS attacks. Although most of the...

Australia’s DDoS on the Census

It was reported that Australia’s census was attacked back in August. The Census Bureau reported on Twitter that they were attacked and their site...

Social Engineering

Social Engineering is a process of psychological manipulation, more commonly known in our world as human hacking. The sad reality behind Social Engineering is...

Headaches for the Holidays

We’re fast approaching the biggest holiday shopping season for retailers. Just how big? According to the National Retail Federation’s annual consumer spending survey, consumers...

Profile of a Hacker

As the hacktivist community continues to grow and evolve, so do the tools and services at a hacker’s disposal. The digital divide between skilled...

The deplorable state of IoT security

Following the public release of the Mirai (You can read more about it here) bot code, security analysts fear for a flood of online...

Are you ready for the new age of attacks?

The unprecedented attacks launched recently against Brian Krebs’ blog (Krebs on Security) and the hosting provider OVH highlight the immense damage from IoT-driven botnets,...

BusyBox Botnet Mirai – the warning we’ve all been waiting for?

On Tuesday, September 20th around 8:00PM, KrebsOnSecurity.com was the target of a record-breaking 620Gbps volumetric DDoS attack designed to take the site offline. A few days...

Is Your Child Hacking Their School?

You might be surprised at who is behind the most recent cases of cyber-attacks on schools. Would you guess that in many cases, it’s...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.