Thursday, September 21, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

How certain assumptions can lead to an attack

Researcher by Researcher
June 14, 2023
in Cybersecurity
0
How certain assumptions can lead to an attack
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack.

A hacker performing a DDoS attack.
Image: iStockphoto/stevanovicigor

Jump to:

A website without high traffic or offering transaction-intensive online commerce does not need to prepare for DDoS attacks because it is not an attractive target.

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023

Such thinking could not be more wrong yet many decision makers think that way.

Cyber criminals don’t care how popular a website is or what it provides for the user. Moreover, hackers are constantly finding new ways to launch even more complex and effective attacks that could have severe financial and reputational consequences for unprepared victims.

Currently, it is easy and inexpensive to launch medium to large-scale cyber attacks. Alternatively, you can book a DDoS attack on one of countless shady platforms, and then you don’t even have to deal with the technology yourself. Hosting companies or ISPs, in particular, face complicated challenges, as the target landscape can change at any time. Therefore, it is even more difficult to guarantee or predict security there. It is, therefore, even more important for these companies to intensively deal with protective measures and always strive for the best possible defense.

The days of not having to prepare for DDoS attacks are long gone. It doesn’t matter the company’s size, the industry, or how well-known the business may be.

No matter what, a company’s protective measures should always be kept up to date, and you should always question yourself about how well-prepared you are against a DDoS attack – or face severe consequences if you are caught unprepared.

Why ‘blackholing’ is no longer sufficient as a strategy

In the past, one strategy often used to thwart a DDoS attack was providing a “black hole” to the targeted IP address and thus separating that address from the rest of the IT infrastructure to prevent the damage from spreading. An IP address with a black hole was inaccessible until the black hole was removed. Many companies still use this type of defense today, but this defense strategy has limits.

When the CISO evaluates the company’s infrastructure, IT systems are given priority ratings. Thus, systems with low ratings are dispensable for a certain period, while systems with high priorities are almost impossible to replace.

At least, that’s the theory. In practice, the dependency on systems has increased massively with many application program interfaces, microservice architectures and other overlaps.

These dependencies and overlaps make systems once considered expendable no longer quite so irrelevant. The danger of a chain reaction is always present; therefore, the blackholing strategy no longer works as effectively as it did in the past.

Outsourcing DDoS protection poses dangerous risks

It is not uncommon for IT managers to outsource DDoS protection to cloud providers or the ISP. By handing over responsibility to an external partner, they aim to conserve their resources – a sensible idea that entails risks that should not be underestimated.

Must-read security coverage

The DDoS defense of such partners is often only rudimentary and rarely meets modern standards. The possibilities range from blackholing to simple ACLs or rate limits. Such providers are frequently unprepared for protocol or application-level attacks and must watch helplessly as a bad actor wreaks havoc. Some isolated ISPs or cloud services now provide modern L3-L7 DDoS protection measures to their customers, but a direct response in the event of an attack occurs only in rare cases.

However, in situations where response time is critical, every second counts. Furthermore, cloud users frequently require additional services such as load balancers or cloud firewalls, which raises costs unnecessarily.

Outsourcing DDoS protection puts one’s actions out of one’s hands in the event of an attack and  can provide a deceptive sense of security. IT managers should have a thorough understanding of the capabilities of their chosen service provider, ensuring infrastructure protection measures provide effective intervention against attacks.

Cybersecurity manual essential for a DDoS strategy

When companies develop cybersecurity manuals, they should include a strategy for DDoS emergencies. In the event of an attack, the response should be obvious. Otherwise, the uptime and availability of your own services will be jeopardized. In the event of a DDoS attack, it is a good idea to have a multi-layered solution approach ready, including technical and organizational measures.

A cutting-edge firewall (next-generation firewall) provides some protection, but due to limited capacities, it is only useful for defending against broad attacks to a limited extent. Furthermore, they cannot defend cloud-based applications and are vulnerable to so-called state execution attacks.

Incorporating an artificial intelligence-based solution into the in-house protection strategy is an effective and proven approach. Such automated protection operates without human error and always keeps the database up to date.

A hybrid approach that combines DDoS protection with the cloud would be an alternative. This allows for real-time traffic filtering and inspection to ensure high DDoS protection. Thresholds are used here; if they are reached, the cloud solution filters out malicious traffic in real-time, allowing only legitimate traffic into the target.

To summarize, a hybrid solution is an appealing approach to maximizing your protection. It combines the best of both worlds and provides a higher level of protection than measures that operate only locally or in the cloud.

Every company should implement a comprehensive DDoS strategy. Only with such a strategy can the impact of attacks be reduced, and ensuring that systems remain operational and unaffected in the event of a targeted DDoS attack.

Read next: Cheat sheet: Distributed denial of service (DDoS) attacks (free PDF) (TechRepublic Premium)



Source link

Tags: assumptionsattacklead
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023
Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023

Recent Posts

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved