Author Archives: Onsite Computing, Inc.

Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps

During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8 terabits per second, the largest publicly recorded to date. The assault consisted of a “month-long” barrage of more than 100 hyper-volumetric DDoS attacks flood. […] Go to Source Author: Ionut Ilascu

Make OT networks a priority, say nine national security agencies

To most people in IT, what happens inside operational technology (OT) networks is a bit of a mystery. They’re hidden networks that keep everything from critical infrastructure to manufacturing humming along. As long as they work, they get very little attention. What happened at a water treatment plant in Oldsmar, Florida, in February 2021 is […]

DDoS attacks are increasingly targeting critical infrastructure

Critical infrastructure sectors including banking, financial services, government, and public utilities such as energy providers, experienced a 55% increase in distributed denial-of-service (DDoS) attacks over the past four years, according to a new report. Released just days after the revelation of the largest-ever DDoS attack, the Netscout report found that many of these attacks use […]

The Secret Weakness Execs Are Overlooking: Non-Human Identities

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe. The problem is that we no longer operate within […]

Fix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its own, researchers find

Resource Public Key Infrastructure (RPKI) is not yet the simple fix for the security weaknesses of the internet’s Border Gateway Protocol (BGP) many in the communications industry think it is, a team of German researchers has warned. In a newly published paper, RPKI: Not Perfect But Good Enough, Haya Schulmann and Niklas Vogel from Germany’s ATHENE […]

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. “Perfctl is particularly elusive and persistent, employing several sophisticated techniques,” Aqua security researchers Assaf Morag and Idan Revivo said in a report shared with The Hacker News. […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.