Cyber Attack Anatomy 101

Cyber Attack Anatomy 101

Cybercrime is the new “mafia” and if you haven’t taken it seriously in the past, you need to pay attention before you or your company become the latest victim. Cyberattacks are a lot more sophisticated, with many of the organisers setting themselves up in the same way that one would create a real technology company. They have all of the professional elements and they assume that companies are focused on
It appears that there is at least one point for the “good guys” when it comes to battling those that launch the dreaded DDoS attacks. A targeted action called “Operation Power Off” was coordinated between U.K., U.S. and Netherlands authorities in which they took down the organisation known as “WebStresser.org

Reduction in DDoS Attacks Thanks to Takedown of WebStresser

It appears that there is at least one point for the “good guys” when it comes to battling those that launch the dreaded DDoS attacks. A targeted action called “Operation Power Off” was coordinated between U.K., U.S. and Netherlands authorities in which they took down the organisation known as “WebStresser.org (formerly Webstresser.co).” This company had over 136,000 registered users and over the last three years was responsible for launching four
Fishtank-casino

Every Day Connected Technologies Are Susceptible for Hacking

As we move closer to integrating our more sophisticated technology products, the Internet of Things (IoT) has become the hot buzzword of action. Connecting everything together for ease of use for our smart homes may sound like the best of all worlds, however, there is one problem that isn’t being appropriately addressed: the protection of each of these technologies against cyber hacking. When you add this additional element of AI
attack-path-mapping

Attack Path Mapping: Protecting your Company’s “Crown Jewels” from Hackers

Security companies have taken on a new and innovative approach in the protection of proprietary corporate information. Traditional security approaches aren’t viable, even though higher dollar amounts are being invested. Attack Path Mapping or APM is a risk assessment as security departments see that the cybercriminals are making use of a shadow access via an alternative infrastructure. A company’s data is their “crown jewels” and Attack Path Mapping helps to
healthcare-cyberattack-davinciforensics

South African Healthcare Industry Vulnerable for Cyberattacks

Cyber criminals are always on the lookout for the easiest way to breach a system. In the past, this often involved sophisticated coding to break into a network and steal critical data. However, the criminals have changed their method of attack as well as their focus. Over the last year or so, they have turned their attention to those industries that are most vulnerable as well as making use of