• Privacy Policy
Tuesday, March 21, 2023
Data Centre & Network News
ADVERTISEMENT
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact
No Result
View All Result
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact
No Result
View All Result
Data Centre & Network News
No Result
View All Result

A10 Networks’ threat research detects and tracks origins of DDoS weapons

Beatrice by Beatrice
May 4, 2022
in Security
5 0
0
Share on FacebookShare on Twitter

It is well-reported that the pandemic caused a spike in cyberattacks, including malware, ransomware and DDoS attacks. Threat actors have sought to disrupt not only services people rely on everyday like healthcare, education and financial but also critical infrastructure, like food supply chains, utilities and government agencies. Correspondingly, there has been a dramatic increase in the weapons that can be used to launch these attacks.

In the 2H 2021 reporting period, A10 Networks security research team tracked over 15.4 million DDoS weapons in 2021. Recently, A10 Networks’ threat intelligence detailed the use of DDoS attacks to disrupt infrastructure and communications in Ukraine in February 2022 just as Russia launched its ground attack.

A10’s threat intelligence research team monitored significant advances in scope and intensity of cybercrimes.

• DDoS weapons are on the rise: 15.4 million are now tracked by A10’s security research team

• There was an increase of over 100%, year-over-year, of more obscure potential amplification weapons, including Apple Remote Desktop (ARD), which was used in the Russia-Ukraine conflict

• Attackers have leveraged the now well-known Log4j vulnerability; more than 75% of Log4j scanners originated in Russia

These, and other trends, are included in the 2022 A10 Networks DDoS Threat Report, which provides detailed insights, including the origins of DDoS activity; the growth of DDoS weapons (the computers, servers and IoT devices that can potentially be used in DDoS attacks) and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organisations can take to protect against such activities.

Organisations must act now – employ zero trust principles

On March 21, 2022, the Biden-Harris Administration issued guidance urging U.S. organisations to act quickly to protect against cyber attacks and state-sponsored cyber warfare given the ongoing Russia-Ukraine conflict.

The guidance, while aimed at U.S.-based organisations, details a sense of urgency for organisations globally to re-evaluate their security posture. Employing Zero Trust principles can not only protect networks but also ensure that they are not being used to launch attacks. A10’s security-led solutions for DDoS protection, TLS/SSL inspection of encrypted traffic and application delivery security capabilities can provide identity-based and context-based Zero Trust policies for specific enforced access.

“Recent events underscore the often devastating impact that cyber attacks have on governments and businesses around the world. A10 Networks tracks the origins of DDoS weapons activity, in addition to other attack vectors, in order to arm customers with useful threat intelligence. This is a critical component of a Zero Trust framework to help organisations better anticipate and mitigate cyber attacks, and also ensure networks are not inadvertently being weaponised,” says Dhrupad Trivedi, president and CEO of A10 Networks.

As a testament to A10’s technology innovation, Frost & Sullivan recently evaluated A10’s DDoS protection solutions, along with several other vendors, and awarded A10 the “2021 Frost & Sullivan Customer Value Leadership award for global DDoS mitigation, for excellence in best practices.”

Tags: A10 Networkscyber securityDDoSintelligenceransomwareResearchsafetySecuritysoftwarethreatsweapons
Share2Tweet1Share

Related Posts

New security platform to fight AI-based cyber attacks

New security platform to fight AI-based cyber attacks

March 16, 2023
78
Jane Frankland takes up advisory role at e2e-assure

Jane Frankland takes up advisory role at e2e-assure

March 10, 2023
44
New group formed to overcome attacks against data centres

New group formed to overcome attacks against data centres

March 10, 2023
70
Neterra stopped nearly 500,000 DDoS attacks in 2022

Neterra stopped nearly 500,000 DDoS attacks in 2022

March 6, 2023
34
Is your business compliant with data sovereignty requirements?

Is your business compliant with data sovereignty requirements?

March 3, 2023
56
Colt launches VMware Cloud Web Security and Secure Access

Colt launches VMware Cloud Web Security and Secure Access

February 23, 2023
53
Next Post
NetIX and Epsilon strengthen partnership through network exchange

NetIX and Epsilon strengthen partnership through network exchange

Can the data centre industry meet demand with supply chain issues?

Can the data centre industry meet demand with supply chain issues?

ADVERTISEMENT
nLighten signs Letter of Intent with City of Eschborn
Data Centres

nLighten signs Letter of Intent with City of Eschborn

March 21, 2023
32
Datum Datacentres wins Megabuyte award
News

Datum Datacentres wins Megabuyte award

March 21, 2023
32

Head office & Accounts:
Suite 14, 6-8 Revenge Road, Lordswood
Kent ME5 8UD
T: +44 (0)1634 673163
F: +44 (0)1634 673173

Data Centres

nLighten signs Letter of Intent with City of Eschborn

March 21, 2023
32
News

Datum Datacentres wins Megabuyte award

March 21, 2023
32
  • Privacy Policy

© 2023 All Things Media Ltd.

No Result
View All Result
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact

© 2023 All Things Media Ltd.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cleantalk Pixel
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.