Remove DDOS Remove Digital transformation Remove Software Remove VPN
article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” Liberator is advertised as a DDoS tool to launch attacks against “Russian propaganda websites.” ” continues the report.

DDOS 86
article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

As far as we know, HermeticWiper remains the most advanced wiper software discovered in the wild. That said, a number of those tools are very crude from a software engineering perspective and appear to have been developed hurriedly. Taking sides: professional ransomware groups, hacktivists, and DDoS attacks.

DDOS 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers identify 223 vulnerabilities used in recent ransomware attacks

SC Magazine

Cybersecurity analysts have been screaming this sentiment from the rooftops for years, but now new research examining the expanding landscape of software vulnerabilities leveraged in ransomware attacks offers up some hard numbers that put the depth of this problem into context. Ransomware is getting worse.

article thumbnail

GUEST ESSAY: Lessons learned in 2021 as cloud services, mobility and cybersecurity collided

The Last Watchdog

To combat this, businesses who are agile in adopting digital transformation strategies reaped the benefits: from better security hygiene to reduce the risk of a data breach to improved productivity that ultimately yields higher revenue. Here are a few important trends that you should consider for 2022: Single vendor SASE play.

Mobile 177
article thumbnail

Best Zero Trust Security Solutions for 2021

eSecurity Planet

Identity and application access, single sign-on with multi-factor authentication, and threat and DDoS protection are some of the ways Akamai cloaks and protects applications while accelerating performance. ” The Stealth software suite offers visibility, microsegmentation, identity, cloud and mobile support, and services.