Blog Post

Infographic: How Botnets Work

By Yohai Einav, Principal Security Researcher

Posted on August 31, 2017 in: Security

Tags:

With IoT on the rise, consumers are rightfully afraid of privacy invasions. But, infected devices can serve far more sinister purposes. Herewith, we breakdown the ways a botnet works.

Read more

Blog Post

Take a Bite out of Cybercrime by Analyzing New Core Domains

By Yuriy Yuzifovich, Head of Security Research and Data Science

hands on keyboard thumb

Posted on August 24, 2017 in: Security

Tags:

We just conducted our monthly Cyber Insider discussion, this time focusing on what deep analysis of new core domains reveals about new threats and zero-day malware. As a company that processes 1.7 trillion DNS queries a day and analyzes 100 billion queries a day from our global service provider customers, we are in a unique position to gain insights.

Read more

Blog Post

A Rich Policy Language for the DNS

By Ralf Weber, Principal Architect, Special Projects

Rich Policy Language DNS

Posted on August 10, 2017 in: Network, Security

Tags: , ,

For many years ISPs in certain parts of the world have been required by their regulators/governments to redirect certain websites that were deemed malicious or suspicious. DNS offered a straightforward way to do this; and Nominum, being a DNS company, developed an early mechanism using a DNS zone file that made it simple for ISPs to comply. The technology was originally named “Malicious Domain Redirection” (MDR), and it basically allowed DNS server operators to perform a single action for a given domain name. Actions could be categorized so that each action or redirection did not have to be repeated.

Read more

Blog Post

How CSPs can Close the Security Loop for SMBs

By Sue Rudd, Director, Service Provider Analysis, Strategy Analytics

credit card point of sale

Posted on August 8, 2017 in: Security

Tags:

The rising cost and complexity of today’s evolving cyberattacks require organizations to take a new approach to cybersecurity – one that blocks threats and malicious sites at the network level and is characterized by a closed loop model. This is particularly true for the small and medium-sized business (SMB) market, where cost constraints and limited security expertise leave Main Street businesses around the globe vulnerable to ransomware and other damaging malware.

Read more

Blog Post

Petya/NotPetya: Ransomware Attacks in a New Form, but is it Ransomware?

By Yohai Einav, Principal Security Researcher

Petya

Posted on July 26, 2017 in: Security

Tags: ,

Ransomware has changed a lot since it was introduced back in 1989 by Dr. Joseph Popp, where 20,000 floppy disks were distributed via snail mail. The malware hid files on a victim’s hard drive and encrypted only the file names, rather than the entire files themselves. As one might assume, the entire remediation process was manual, rather than digital. Popp’s program asked victims to print the ransom note and send $189 to a bank in Panama. When he was caught, he was determined unfit to stand trial. All the money he obtained was donated to AIDS research.

Read more

Blog Post

Petya Runs Wild

By Bruce Van Nice, Director, Product Marketing

mountain-line-in-snow

Posted on June 30, 2017 in: Security

Tags:

As has been widely reported, a new ransomware known as ‘petya’ (also being referred to as `notpetya` or `petwrap` in the research community) started circulating on the internet earlier this week. It appears the attacks started in Eastern Europe and caused widespread damage around the globe.

Read more

Blog Post

The Importance of DNS in Security – Part 2

By Dean McDonald, Senior Director, Sales Engineering, Asia Pacific

Iron Bars

Posted on June 20, 2017 in: Security

Tags:

In my last blog post, part 1 of this series, I discussed the important role DNS plays in protecting service provider networks from DNS amplification attacks, and the necessity of not only blocking malicious queries but also of not blocking good queries. In this post, I’ll look at Pseudo-Random Subdomain (PRSD) attacks and other malware (like phishing and ransomware), showing why DNS is perfectly suited to protect both networks and subscribers.

Read more

Blog Post

The Importance of DNS in Security – Part 1

By Dean McDonald, Senior Director, Sales Engineering, Asia Pacific

Posted on June 13, 2017 in: Security

Tags: , ,

The importance of the DNS security protocol in general is widely understood, particularly in today’s overall security landscape. Anyone who currently manages (or has managed) caching/recursive or authoritative DNS servers knows the pain it causes when they go down. It’s bad. Without available DNS there is no internet, at least no usable internet. Generally, most, if not all applications today rely on DNS to locate resources somewhere on the internet to function. Additionally, said apps are becoming more and more reliant on the DNS.

Read more

Blog Post

Delivering a Safe, Reliable Internet to Canadians

By Mark Gaudet, Manager of Business Development, CIRA

Canadian Flag

Posted on May 31, 2017 in: Network, Security

Tags:

The Domain Name System – the DNS – is the foundation of the internet. Beyond connecting IP addresses with web requests, DNS provides the basis for both the detection of and protection from global cyberthreats before they reach an organization’s corporate network resources —particularly given that more than 90% of malware uses DNS for command and control. This presents a tremendous opportunity for service providers to utilize their DNS infrastructure to provide security services to their business customers, which have a tremendous need for stronger, more proactive cyber protection.

Read more

Blog Post

Security as a Service for SMBs: How ISPs can Fill a Rapidly Growing Need

By Arlen Frew, GM, Security & Applications

smb-security-as-service-blog

Posted on May 24, 2017 in: Security

Tags: , , ,

With cyberattacks affecting SMBs at an alarming rate, business owners are challenged with putting strong enough security in place to protect them from the average $20,000 price tag per incident. Ransomware in particular has hit the SMB sector hard. As stated in a recent study by Arctic Wolf Networks, last year saw a 433% increase in ransomware attacks against SMBs1 – a number that is expected to grow.

Read more

1 2 3 8