Guest Article - Page 15

Sherrod DeGrippo, Senior Director of Threat Research and Detection at Proofpoint.

Block the loader, block the ransomware

Ransomware attacks still use email — but not in the way you might think. Ransomware operators often buy access from independent cybercriminal groups who infiltrate major targets and then sell access to
3 years ago
Rajiv Kapoor, Senior Product Marketing Manager, NGINX at F5

How to build protection from Layer 7 attacks

The earliest Denial-of-service DoS attacks flooded servers with requests for TCP or UDP connections so‑called volumetric attacks at the network and transport layers 3 and 4. Increasingly, though, DoS attacks use HTTP, HTTPS requests
3 years ago
1 13 14 15 16 17 70

Categories