Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What Are Cyber Criminals?

Cyber criminals are individuals or groups of people who use computers and networks to commit online crimes. Sometimes using malware programs, they aim to harm other individuals, companies, and governments. Though their methods are varied, cyber criminals frequently employ ransomware, holding your data hostage; and data exfiltration, the unauthorized extraction of your data. Guarding against cyber crime requires the awareness and participation of everyone in an organization.

Infrastructure Attacks vs. Application Attacks

An infrastructure attack aims to exploit vulnerabilities in the network layer or transport layer. These attacks are called DDoS attacks and include SYN floods, Ping of Death, and UDP floods. Infrastructure attacks can be broken down into two subcategories: volumetric attacks and protocol attacks. Volumetric attacks focus on inundating a server with false requests to overload its bandwidth, while protocol attacks target specific protocols to crash a system.

What is a data breach?

Data breaches can take many forms, from an unintentional release of information by an unaware employee, to a cyber criminal using stolen login credentials to access sensitive data to a ransomware attack that encrypts a company's confidential information. The types of data that can be involved also vary; it can be personal health information, such as medical records; personally identifiable information like driver's license numbers, financial information, such as credit card numbers; and trade secrets and intellectual property like product designs.

AWS hit by Largest Reported DDoS Attack of 2.3 Tbps

A significant milestone occurred with the reported largest DDoS attack on Amazon Web Services (AWS) reaching 2.3 terabits per second. This is a substantial increase of 70% from the previous record holder, the Memcached-based GitHub DDoS attack in 2018, which measured 1.35 terabits per second. Over the years, these attention-grabbing performance gains in DDoS attacks have been rising consistently, with major high-profile attacks happening every two years.

How to value a business

The process of estimating a company's worth is called a valuation. All aspects of a company are considered to arrive at an accurate assessment of the whole and its constituent parts. Many legal and financial situations call for an accurate assessment of a company's worth, such as during a sale, the distribution of partnership interests, taxation, or even a marital dissolution. Many business owners consult with outside valuation experts when trying to get a handle on how much their company is worth.

Bid goodbye to ransomware attacks with Endpoint Central's Anti-Ransomware

Ransomware is an alarming cyberthreat that’s been evolving over the decades. According to Statista, there were a total of 236.1 million ransomware attacks worldwide during the first half of 2022. When organizations do not pay attention to their company’s cybersecurity structure, attackers instigate ransomware attacks by encrypting confidential files and folders, and ultimately demanding ransom. The ransom varies according to the type of ransomware variants.

The remote IT workforce boom and ways to face it

When the entire world decided to shut down following the COVID-19 outbreak, did it stop organizations from doing their work? Did banks and hospitals take a break? Many had to carry on their daily routine to keep the world alive. Employees were scattered across every corner of the world. Yet sysadmins were still expected to maintain control of the endpoints in the organization and troubleshoot issues instantly.

Why Choose Penetration Testing as a Service?

For companies looking to stay ahead of the ever-evolving cybersecurity landscape, penetration testing is one of the most important services they can invest in. Penetration Testing as a Service (PTaaS) provides businesses with an effective way to identify security vulnerabilities before they become major issues and cause irreversible damage.

Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. With the explosive growth of technology, businesses are more vulnerable than ever to malicious cyber attacks. And as cybercriminals become more sophisticated, new methods of attack are popping up left and right.