The latest from Arbor Networks

  • IoT Botnets: The Stakes Have Changed. Have you?2:51

    IoT Botnets: The Stakes Have Changed. Have you?

    The Internet of Things (IoT) has been called the next Industrial Revolution. Analysts have forecasted there will be nearly 50 billion devices connected to the internet by 2020, up from 10 billion in 2

    Watch Video
  • Diving Into Buhtrap Banking Trojan Activity

    Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported...

    Read Article
  • FlokiBot: A Flock of Bots?

    In early October, Flashpoint released an analysis of an underground forum advertisement for a new malware family known as FlokiBot. It took some time before a sample was found in the wild, but a...

    Read Article
  • Flying Dragon Eye: Uyghur Themed Threat Activity

    DOWNLOAD FULL REPORT HERE DOWNLOAD INDICATORS OF COMPROMISE (IOCs) HERE This paper documents attempted exploitation activity aimed at Uyghur interests outside of China. Exploitation is being...

    Read Article
  • Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in...

    Read Article
  • Mirai IoT Botnet Description and DDoS Attack Mitigation

    Authors:  Roland Dobbins & Steinthor Bjarnason Since its inception in August of 2016, the Mirai ‘Internet-of-Things’ (IoT) botnet, comprised largely of internet-enabled digital video recorders...

    Read Article
  • TrickBot Banker Insights

    TrickBot Banker Insights

    A new banking trojan, TrickBot, has seemingly risen from the ashes left behind by the November 2015 takedown of Dyreza/Dyre infrastructure and the arrests of threat actors identified by Russian...

    Read Article
  • Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

    Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

    Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week’s theme is “Our Continuously Connected Lives: What’s Your...

    Read Article
  • Annual Security Survey – Call for Participation

    It’s that time again! Arbor Networks is opening its 12th annual Worldwide Infrastructure Security Report survey. Findings from this survey are compiled and analyzed to provide insights on a...

    Read Article
  • On DNS and DDoS

    On DNS and DDoS

    The global DNS infrastructure provides the critical function of mapping seeming random sets of numbers in IP addresses (like 1.1.1.1) to a name that an Internet consumer may recognize (like...

    Read Article
  • New Consumer Survey Shows High Anxiety about Online Security Does Not Translate into Action2:50

    New Consumer Survey Shows High Anxiety about Online Security Does Not Translate into Action

    A new consumer study concluded that two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the w

    Watch Video
  • New Consumer Survey Shows High Anxiety about Online Security Does Not Translate into Action2:50

    New Consumer Survey Shows High Anxiety about Online Security Does Not Translate into Action

    A new consumer study concluded that two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the w

    Watch Video
  • Some Perspective on IoT Devices and DDoS Attacks

    Some Perspective on IoT Devices and DDoS Attacks

    Embedded Internet-of-Thing (IoT) botnets are not a new phenomenon – we’ve seen them leveraged to launch DDoS attacks, send spam, engage in man-in-the-middle (MitM) credentials hijacking, and other...

    Read Article
  • Arbor Networks Spectrum Data Sheet

    Arbor Networks Spectrum Data Sheet

    Read Flipbook
  • The Great DGA of Sphinx

    The Great DGA of Sphinx

    This post takes a quick look at Sphinx’s domain generation algorithm (DGA). Sphinx, another Zeus-based banking trojan variant, has been around circa August 2015. The DGA domains are used as a...

    Read Article
  • Annual Security Survey – Call for Participation

    Annual Security Survey – Call for Participation

    It’s that time again! Arbor Networks is opening its 12th annual Worldwide Infrastructure Security Report survey. Findings from this survey are compiled and analyzed to provide insights on a...

    Read Article
  • National Cyber Security Awareness Month

    National Cyber Security Awareness Month

    October is National Cyber Security Awareness Month and according to the U.S. Department of Homeland Security, “National Cyber Security Awareness Month is designed to engage and educate public and...

    Read Article
  • Network Traffic Analysis for Security: A “Market” on the Cusp of the Chasm?

    Network Traffic Analysis for Security: A “Market” on the Cusp of the Chasm?

    At Arbor, and at our parent company NETSCOUT, we talk a lot about the value that comes from Network Traffic. Traffic can bring end-to end visibility of all users, applications and services, their...

    Read Article
  • Panda Banker’s Future DGA

    Panda Banker’s Future DGA

    Since we last visited the Panda Bankers at the malware zoo, two new versions have emerged: 2.2.6 and 2.2.7. While sifting through the encrypted strings of the latest version, two interesting ones...

    Read Article
  • IDC - Threat Analysis with Rob Westervelt3:02

    IDC - Threat Analysis with Rob Westervelt

    The threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyber espionage. T

    Watch Video
  • loading
    Loading More...