You are viewing 'DDoS'

Business Continuity When Using Cloud Services

Linode DDoS Attack

Vance Baker

February 02, 2016 - Posted by Vance Baker to Security Insight

Cyber Attacks Ahead

2015 ended with a bang and 2016 appears to be starting distressed …at least as far as Linode is concerned. Linode, a cloud service provider, has been under a Distributed Denial of Service (DDoS) attack since Christmas week. The attack has negatively impacted availability of all Linode’s global data centers and has brought the Atlanta data center under such a state of siege that operations were suspended for almost two days.

So, what are the lessons we might learn from this experience? 

First, the need for business continuity planning is especially important as we leverage cloud service providers in fulfillment of our service delivery objectives. When the unthinkable happens (e.g., shutdown of a service provider’s hosting operation), will the impact to subscribers be such that business reputation will be impaired? The answer is most certainly a resounding “YES.” We must consider the ability of the service provider to reallocate... read more >

Black Energy Malware is Back...and Still Evolving

Danika Blessman

January 18, 2016 - Posted by Danika Blessman to Threat Intelligence

Industrial Control Systems

Black Energy (BE) malware is back in the news as of early January 2016. This time it is being blamed for contributing to a power outage on December 23, 2015 in Ukraine, which left nearly half the populace in the Ivano-Frankivsk region without power for several hours.

Discovered in 2007, BE was originally designed as a distributed-denial-of-service (DDoS) toolkit but has since evolved to its current state, supporting a multitude of plug-ins. The newest features of the BE malware include:

  • KillDisk, a destructive data-wiping utility capable of destroying an estimated 4000 file types, including registry files. This function could render the host unbootable, and depending on the infected host, could have dire consequences. Based on the malware’s typical target set of Industrial Control Systems (ICS), an infected host could prove to be disastrous, not to mention expensive.
  • Researchers also identified a previously unknown Secure Shell (SSH) backdoor...
read more >

Cybersecurity Quiz

Do you know what you don't know?

Guest Blogger

December 08, 2015 - Posted by Guest Blogger to Security Insight


Data theft is on the rise, and it's getting more expensive. A recent study conducted by the Ponemon Institute now puts the average cost of a data breach at $3.8 million per incident. In the case of data theft, it's safe to say that an ounce of prevention is worth far more than a pound of cure. How much do you know about cybersecurity? Take our quiz and find out — or better yet, attend our Security Summit (at no cost to you!) next week where these topics will be covered in detail by cybersecurity experts.

True or False:

  1. Your business has a 30% chance of being hit with a DDoS (Distributed Denial of Service) attack.
  2. Social engineering is one of the biggest security threats facing...
read more >

#OpRemember 2015

2015 Anonymous #OpRemember Hacking Campaign

Jon-Louis Heimerl

November 03, 2015 - Posted by Jon-Louis Heimerl to Threat Intelligence


The hacking collective Anonymous originated with fights against censorship and anti-digital piracy. It has become a hacktivist group which claims to use cyberattacks as a method of protest against corruption and hypocrisy in both government and industry.

Historically, one of the Anonymous campaigns has been known as “#OpRemember” and usually climaxes with website defacements, cyberattacks and DDoS attacks on November 5, “Guy Fawkes Day.” It appears #OpRemember was originally associated with Guy Fawkes because of his opposition to the British government. In reality, Guy Fawkes’ anti-government sentiments were primarily related to his religion – so much so that he assisted with the plot to assassinate the King of England and many members of the British Parliament, simply because of their religion.

Most years, researchers can find information about planning activities related to #OpRemember as early as May. In previous years,... read more >

Planning for DDoS Attack Mitigation

Hacktivism Makes Preplanning Critical

Sherry Cummins

January 20, 2015 - Posted by Sherry Cummins to Security Insight


Over the past few months, the frequency of stories in the news regarding Distributed Denial of Service (DDoS) attacks due to hacktivism has grown rapidly.
Victims of these attacks range from gamers and game providers such as World of Warcraft, large corporations (Microsoft), media outlets (CNN), city and state websites and entire countries. It seems like anyone with a cause, who wants to get their point across via protest, now uses denial of service against their targets as a standard expression of their discontent.

DDoS is the Molotov cocktail of Internet... read more >

1 | 2 | 3 | 4 | 5 | 6 | 7 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)