Home Tags Protocol

Tag: Protocol

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

A cloud storage architecture for the enterprise

Yaniv Romem is co-founder and CTO and Tom Leyden is VP of corporate marketing at ExceleroTech giants such as Amazon, Facebook, and Google have redefined IT for web-scale applications, leveraging standard servers and shared-nothing architectures to ensure maximum operational efficiency, flexibility, and reliability.

As new application workloads – cloud, mobile, IoT, machine learning, and real-time analytics – drive the need for faster and more scalable storage, enterprises are seeking to optimize their infrastructures in the same way as these tech giants.Excelerorsquo;s NVMeshmdash;a unified, scale-out, software-defined, block storage solution that runs on industry standard serversmdash;was designed in response to these needs. NVMesh leverages NVMe high-performance flash, a highlydistributed architecture, intelligent clients that minimize cluster communications, and a proprietary storage access protocol that bypasses the CPU on storage targets.To read this article in full or to leave a comment, please click here

How WannaCrypt attacks

WannaCrypt's roots -- the malware behind world's biggest ransomware attack ever -- lie in an old Windows network protocol.

Windows 10 tip: Stop using the horribly insecure SMBv1 protocol

For years, Microsoft has been recommending that you disable the vulnerable SMBv1 protocol.

The recent WannaCry ransomware outbreak underscores the need to take this important step. Here's how.

Waah! WannaCry shifts the blame game into high gear

More and more, information security seems to be about finding someone to blame for the latest crisis.

The blame game was in full gear within hours of the WannaCry ransomware outbreak, and even after a few days therersquo;s still a lot of anger to go around. People want heads to roll, but that wonrsquo;t help contain the current damage or spur improvements to minimize the impact of future attacks.The WannaCry ransomware successfully infected so many machines because it crafted the malware to use multiple infection vectors, including traditional phishing, remote desktop protocol (RDP), and a vulnerability in the SMB protocol.
It took advantage of the fact that people donrsquo;t always recognize phishing links, and that many systems arenrsquo;t running the latest versions of applications or the operating system.To read this article in full or to leave a comment, please click here

Massive cryptocurrency botnet used leaked NSA exploits weeks before WCry

Campaign that flew under the radar used hacked computers to mine Monero currency.

WannaCry ransomware slipped in through slow patching

The plain truth about security updates is that enterprises will always have a lag time between when patches are released and when they're deployed.

Even so, too many organizations are taking too long to test and schedule, and they're paying the pric...

Cisco kills leaked CIA 0-day that let attackers commandeer 318 switch...

Fix neutralizes attack code that was put into the wild in early March.

SS7 Flaws Exploited in Attacks Against Mobile Users’ Bank Accounts

Cyberthieves exploited long-known vulnerabilities in the Signaling System 7 (SS7) protocol, attacking bank accounts in Germany by intercepting two-factor authentication codes sent to mobile phones.

After years of warnings, mobile network hackers exploit SS7 flaws to...

O2 in Germany confirms online thefts from sour krauts Experts have been warning for years about security blunders in the Signaling System 7 protocol – the magic glue used by cellphone networks to communicate with each other.…

Thieves drain 2fa-protected bank accounts by abusing SS7 routing protocol

The same weakness could be used to eavesdrop on calls and track users’ locations.

Micron’s SolidScale system pushes SSDs out to shared storage

SSDs operate the fastest when inside a computer. Micron's new SolidScale storage system uproots SSDs from servers and pushes them into discrete boxes while reducing latency.SolidScale is a top-of-the-rack storage system that will house many SSDs.
It...