Generative Data Intelligence

Tag: DDoS attacks

What Is A Distributed Denial of Service (DDoS) Attack?

A Distributed Denial of Service (DDoS) attack is an attempt by a bad actor to disrupt the operation of an application,...

Bangladeshi Elections Come into DDoS Crosshairs

The end of 2023 saw an uptick in distributed denial-of-service (DDoS) traffic across major industries in Bangladesh, and it may have been geared to...

The Rise of AI-Based Cyberattacks in the Medical Industry

Artificial intelligence has seen increased adoption in health care with dozens of promising results, including the ability to spot breast cancer and diagnose blood...

Syrian Threat Group Peddles Destructive SilverRAT

The group behind a sophisticated remote access Trojan, SilverRAT, has links to both Turkey and Syria and plans to release an updated version of...

In Cybersecurity and Fashion, What’s Old Is New Again

COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...

A year in review: 10 of the biggest security incidents of 2023

Digital Security As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that occurred in...

How to Prepare for DDoS Attacks During Peak Business Times

Threat groups are constantly getting more sophisticated in their attempts to evade detection and enact harm. One common tactic that many security practitioners have...

How to Prepare for DDoS Attacks During Peak Business Times

Threat groups are constantly getting more sophisticated in their attempts to evade detection and enact harm. One common tactic that many security practitioners have...

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Video How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus...

ESET Threat Report H2 2023

ESET Research, Threat Reports A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET...

Delivering trust with DNS security

Cybercrime continues to grow rapidly; indeed, it is a highly lucrative global industry. Without accurately accounting for profits from cybercrime (1, 2), we are...

Proxy Trojan Targets macOS Users for Traffic Redirection

A sophisticated proxy Trojan targeting macOS has been discovered and is being distributed through pirated versions of genuine business software, including editing tools, data...

Latest Intelligence

spot_img
spot_img
spot_img