article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” Liberator is advertised as a DDoS tool to launch attacks against “Russian propaganda websites.” Pierluigi Paganini.

DDOS 86
article thumbnail

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The Last Watchdog

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development. Related: ‘Business logic’ hacks on the rise Consider that we began this century relying on the legacy “waterfall” software development process. if not outright project failure.

Software 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales + Imperva: Delivering the Next Generation of Data Security

Thales Cloud Protection & Licensing

Application Security : Mitigate against volumetric attacks with DDoS Protection, protect applications with Web Application Firewall (WAF), combat bad bots and online fraud with Advanced Bot Protection (ABP), discover and protect API endpoints with API Security, and secure the software supply chain with Runtime Application Self-Protection (RASP).

article thumbnail

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

The Last Watchdog

Related: How 5G will escalate DDoS attacks Caught in the pull of digital transformation , companies are routing ever more core operations and services through the Internet, or, more precisely, through IP addresses, of one kind or another. Meanwhile, DDoS attacks are renowned for causing massive outages. Makes sense.

DDOS 171
article thumbnail

Cyber Attackers Tap Cloud Native Technologies in Russia-Ukraine War

Security Boulevard

Then it analyzed container images in Docker Hub and popular code libraries and software packages (including PyPI, NPM, Ruby), searching for names and text labels that called for action against either side. “As Tale of 3 Clouds eBook: How Venafi Creates Digital Transformation. ". UTM Medium. UTM Source. UTM Campaign.

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

As far as we know, HermeticWiper remains the most advanced wiper software discovered in the wild. That said, a number of those tools are very crude from a software engineering perspective and appear to have been developed hurriedly. Taking sides: professional ransomware groups, hacktivists, and DDoS attacks.

DDOS 134
article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Software is now central to the operation of our economy – as digital transformation washes over every industry. And yet, the awareness of cyber security risks – from phishing and social engineering attacks to software supply chain compromises – remains low.