tcp/ip


Hackers have been using evasion techniques for years to get malicious payloads past firewalls. Make sure your firewall is set up out of the box to detect these attacks. So-called evasion techniques have been part of the hacker’s toolkit for years. Evasion techniques attempt to confuse, overwhelm, or blind firewalls with unexpected data, letting the bad guys (or bots) circumvent intrusion detection algorithms and launch attacks or sneak malicious payloads past the firewall. Next gen firewalls (NGFWs) are generally designed to, among other things,... [Read More]
by RSS Chris Dawson  |  Oct 09, 2014  |  Filed in: Industry Trends
All one has to do is take a look at the latest headlines to know that Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace in the enterprise environment. But that doesn't make them any less of a threat. In fact, quite the opposite. These days, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of lost service time, while damaging brands and costing victim companies millions in lost revenues. And many of these attacks now come equipped with stealth capabilities that can easily dodge... [Read More]
by RSS Stefanie Hoffman  |  Apr 10, 2014  |  Filed in: