Lizard Squad Ransom Threats: New Name, Same Faux Armada Collective M.O.

CloudFlare recently wrote about the group of cyber criminals claiming to be be the “Armada Collective.” In that article, we stressed that this group had not followed through on any of the ransom threats they had made. Quite simply, this copycat group of cyber criminals had not actually carried out Continue Reading

WordPress 4.5.1 Maintenance Release

After about six million downloads of WordPress 4.5, we are pleased to announce the immediate availability of WordPress 4.5.1, a maintenance release. This release fixes 12 bugs, chief among them a singular class issue that broke sites based on the Twenty Eleven theme, an incompatibility between certain Chrome versions and Continue Reading

A Secure Foundation: Keep Your Enemies Close and Your Internal Network Closer

I don’t think a day goes by without hearing about another company that was a victim of a data breach.  These companies are not small either.  Organizations like the Office of Personnel Management (OPM), The Internal Revenue Service (IRS), United Airlines and many others have all lost very sensitive data.  Continue Reading

The revenge of the listening sockets

Back in November we wrote a blog post about one latency spike. Today I’d like to share a continuation of that story. As it turns out, the misconfigured rmem setting wasn’t the only source of added latency. It looked like Mr Wolf hadn’t finished his job. [youtube https://www.youtube.com/watch?v=h4WbjwBJXw0?t=33&w=640&h=360] After adjusting Continue Reading

Cybersecurity Skills Shortage Is Not Just About Having the Right Products and Technology; It’s About Solving the People Challenge

Cybersecurity Skills Shortage Is Not Just About Having the Right Products and Technology; It’s About Solving the People Challenge It’s evident that demand for trained and experienced cybersecurity professionals far exceeds supply. With 46% of organizations now claiming that they have a problematic shortage of cybersecurity skills, significantly up from Continue Reading

CryptoWall, TeslaCrypt and Locky: A Statistical Perspective

It’s been over two weeks since we reported about Locky and predicted that it will be a major player in the ransomware scene. We decided to check our Intrusion Prevention System (IPS) telemetry statistics for CryptoWall, TeslaCrypt and Locky two weeks after (Feb 17th to March 2nd) to see how Continue Reading

A Deep Dive Into DNS Packet Sizes: Why Smaller Packet Sizes Keep The Internet Safe

Yesterday we wrote about the 400 gigabit per second attacks we see on our network. One way that attackers DDoS websites is by repeatedly doing DNS lookups that have small queries, but large answers. The attackers spoof their IP address so that the DNS answers are sent to the server Continue Reading

Haystacks and Needles: IoT Security through "Pico"-Segmentation

Over the past year or so we’ve heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres… but is it enough? Can we delve even deeper? I believe there may be a third leg to the segmentation stool: pico-segmentation. Before I explain, Continue Reading

Flexible, secure SSH with DNSSEC

UPDATE: Corrected the paragraph about the permissions of the AuthorizedKeys file. If you read this blog on a regular basis, you probably use the little tool called SSH, especially its ubiquitous and most popular implementation OpenSSH. Maybe you’re savvy enough to only use it with public/private keys, and therefore protect Continue Reading

>