Author: David Gadnyx

What is a DDoS Attack? DDoS stands for Distributed Denial of Service attacks. Let’s ignore the Distributed for now as it refers mainly to the technique and let’s focus on the Denial of Service first. As the term implies, the objective of a DoS attack is to disrupt or deny services from legitimate users. A service can be anything including web sites that provide information, online services such as ecommerce sites or backend services such as payment processing, the communication between organizations and cloud applications, the connectivity of remote internet controlled industrial processes or sensors. The objectives of the attacks include defacement, creating an impact on the economy of an organization or nation by impacting productivity, creating chaos, or as…

Read More

Network transformation is having a direct impact on cybersecurity. New and improved scalability, agility and bandwidth are benefiting not just legitimate users – but also bad actors. And service providers need to be prepared. Service providers embrace edge-centric computing in their fixed and mobile networks to deliver better user experiences, better performance and emerging real-time services. However, more scalable infrastructures, high traffic bandwidth, advance connectivity, and different network architecture also impact the cybersecurity threat landscape. The same capabilities that allow service providers to raise the bar on performance and introduce new services also allow bad actors to execute larger, more…

Read More

Imperva Data Security Fabric Provides Bold New Approach to Securing All Data in Multicloud and Hybrid Environments SAN MATEO, CA — April 6, 2022 — Imperva, Inc., (@Imperva) the comprehensive digital security leader, introduces the Imperva Data Security Fabric (DSF) to modernise and simplify data governance, security, and workflow management for all data across multicloud and hybrid environments. Imperva DSF standardises data security controls across enterprise environments to provide full visibility of what is happening across all file stores and assets, on-premises, and across clouds. Its flexible architecture supports a wide range of data repositories, ensuring security policies are applied…

Read More

Melbourne, Australia – 7 March, 2022 – Specialist cybersecurity solutions distributor Chillisoft today announced it has partnered with email security and cyber resilience company Mimecast (NASDAQ: MIME). This distribution partnership expands Chillisoft’s portfolio of advanced security solutions and signals an increased focus for Mimecast on the New Zealand Fiji markets. According to Alex Teh, CEO of Chillisoft, the New Zealand cybersecurity market has shifted gears in the last year. “The combination of high-profile cyberattacks and a skills squeeze due to COVID lockdowns have shaken up the industry,” said Teh. “As a result, we are in an environment where cybersecurity needs…

Read More

LogRhythm Unveils New Brand Identity Today, LogRhythm introduced its new brand identity. The rebrand is designed to represent the company’s commitment to helping security operations centres close workforce gaps, increase knowledge of new attacks and techniques and navigate an ever-changing threat landscape with confidence. The rebrand is the first of many changes to come in 2022 for LogRhythm, including a fresh visual look, an upcoming cloud-native platform and new outlook that reflects the company’s vision and evolution. “The new brand communicates our continued commitment to being cyber advisories and technology allies for our customers and partners by making cybersecurity operations…

Read More

Gartner® names Netskope a Leader in the inaugural Magic Quadrant for Security Service Edge (SSE). SSE is a set of security services that enable a successful SASE architecture, securing people and data in the cloud without degrading user experience. In the new report, you’ll gain insights into why we’re positioned in the Leaders Quadrant. We think it comes down to a few key advantages. With Netskope Intelligent Security Service Edge, you can: Reduce risk Accelerate performance Provide granular visibility to any cloud, web, and private application activity With Netskope, you’ll be ready for anything on your SASE journey with the…

Read More

ESET Threat Report T3 2021 The latest issue of the ESET Threat Report (covering September to December 2021) sheds light on the most frequent external attack vectors, the reason behind the rise of email threats, and shifts in the prevalence of certain types of threats due to fluctuating exchange rates of cryptocurrencies. T3 2021 was quite a busy period for ransomware. According to ESET Research, the first and biggest spike occurred on September 9, caused by Sodinokibi/Revil hitting South Africa, only days before the country’s Department of Justice saw its systems encrypted. Take leaked Babuk source code, add one Sodinokibi…

Read More

The Log4Shell zero day vulnerability is truly one of the most significant security threats of the past decade and its effects will be felt far into 2022 and beyond. Imperva has observed over 102M exploitation attempts across thousands of sites protected by Imperva Cloud Web Application Firewall (WAF). In the days following, the team at Imperva also responded to the additional Log4j-related vulnerabilities disclosed following the initial zero day publication, to ensure the best possible protection for our customers. There is a wealth of resources readily available online that explain what each Log4j vulnerability is and how the exploits work…

Read More