The latest from Arbor Networks

  • Additional Insights on Shamoon2

    Additional Insights on Shamoon2

    IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2 malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle which started with...

    Read Article
  • History doesn’t repeat itself but it often rhymes

    History doesn’t repeat itself but it often rhymes

    Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex...

    Read Article
  • Flokibot Invades PoS: Trouble in Brazil

    Flokibot Invades PoS: Trouble in Brazil

    Introduction Threat actors salivate at the thought of an increased volume of credit and debit card transactions flowing through endpoints they have compromised with card-stealing malware. While...

    Read Article
  • A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

    A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

    As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks.  At the beginning of 2016 we noted the largest attack being...

    Read Article
  • Arbor Networks 12th Annual Worldwide Infrastructure Security Report2:35

    Arbor Networks 12th Annual Worldwide Infrastructure Security Report

    Arbor Networks 12th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from network and security professionals at the world’s leading service provider, cloud/hosting and e

    Watch Video
  • Author observation on Arbor’s 12th annual Worldwide Infrastructure Security Report

    Arbor Networks 12th annual Worldwide Infrastructure Security Report provides direct insights from the global operational security community on a comprehensive range of issues from threat detection...

    Read Article
  • How ATLAS Enriches Arbor’s WISR

    How ATLAS Enriches Arbor’s WISR

    Next week Arbor Networks celebrates the release of the 12th edition of its popular Worldwide Infrastructure Security Report (WISR), which is primarily based upon a survey of individuals within the...

    Read Article
  • Higher Education’s Lessons on Cybersecurity

    Higher Education’s Lessons on Cybersecurity

    As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks –...

    Read Article
  • Non-Government Organization in Support of Government Hopes

    Red Team analysis is the process of viewing a situation from the perspective of an adversary thus providing insights beyond those that might otherwise be limited by normative biases. This blog...

    Read Article
  • Dismantling a Nuclear Bot

    Dismantling a Nuclear Bot

    A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the...

    Read Article
  • Dismantling a Nuclear Bot

    Dismantling a Nuclear Bot

    A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the...

    Read Article
  • On the Economics, Propagation, and Mitigation of Mirai

    By Kirk Soluk and Roland Dobbins In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally...

    Read Article
  • Analysis of CryptFile2 Ransomware Server

    Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and...

    Read Article
  • Extracting Meaning and Knowledge of Big Data

    Extracting Meaning and Knowledge of Big Data

    We’re very pleased to announce  the availability of Arbor Networks SP Insight, our extension to the critically-acclaimed Arbor SP platform long-used by our customers for network traffic visibility...

    Read Article
  • IoT Botnets: The Stakes Have Changed. Have you?2:51

    IoT Botnets: The Stakes Have Changed. Have you?

    The Internet of Things (IoT) has been called the next Industrial Revolution. Analysts have forecasted there will be nearly 50 billion devices connected to the internet by 2020, up from 10 billion in 2

    Watch Video
  • Diving Into Buhtrap Banking Trojan Activity

    Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported...

    Read Article
  • FlokiBot: A Flock of Bots?

    In early October, Flashpoint released an analysis of an underground forum advertisement for a new malware family known as FlokiBot. It took some time before a sample was found in the wild, but a...

    Read Article
  • Flying Dragon Eye: Uyghur Themed Threat Activity

    DOWNLOAD FULL REPORT HERE DOWNLOAD INDICATORS OF COMPROMISE (IOCs) HERE This paper documents attempted exploitation activity aimed at Uyghur interests outside of China. Exploitation is being...

    Read Article
  • Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Upcoming Webinar – DDoS Attacks: The Stakes Have Changed, Have You?

    Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in...

    Read Article
  • Mirai IoT Botnet Description and DDoS Attack Mitigation

    Authors:  Roland Dobbins & Steinthor Bjarnason Since its inception in August of 2016, the Mirai ‘Internet-of-Things’ (IoT) botnet, comprised largely of internet-enabled digital video recorders...

    Read Article
  • loading
    Loading More...