Record Breaking DDoS Attacks

APTFilter AVGNews CERT-LatestNews FSecureNews KasperskyNews Malware McAfeeNews Security News SocialEngineering SophosNews SymantecNews ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic TrendMicroNews Uncategorized VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesCisco VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesMicrosoft VulnerabilitiesMozilla VulnerabilitiesNetwork VulnerabilitiesOS VulnerabilitiesVMWare VulnerabilitiesVOIP

DDoS attacks are gaining speed according to the latest Nexusguard Q1 2017 DDoS Report. The report shows that DDoS attack volumes have increased by 380% since the same time last year, based on 16,600 attacks. Bob Noel, Director of Strategic Relationships and Marketing at Plixer commented below.

Bob Noel, Director of Strategic Relationships and Marketing at Plixer:

 “Unless IoT security becomes a point of focus for manufacturers and users, this growth trend of DDoS attacks will not slow down.  The rapid expansion in the number of infected IoT devices has established vast botnets, like Mirai, Hajime, and Shishiga.  Botnets like these can be leveraged to unleash armies of devices to launch DDoS-for-hire-attacks. Anyone with a few dollars can attack any organization, at any time, for any reason by simply going to website and entering a few details.  IoT devices should never be deployed using default usernames and passwords, and all traffic to and from these devices should be monitored with network traffic analytics to ensure that they are not transmitting anything that falls outside of a least privilege model.  IoT devices are purpose-built and communicate over a very narrow set protocols and applications to a limited set of servers.  No communication beyond this should be allowed.”