Our DNS is Under Attack is not something anyone wants to hear. DNS’s critical role known to the miscreants, DDoS Extortionist, DDoS Attackers, and other threat attackers. Taking out DNS is easier than trying to take down a website. Smart miscreants have a playbook of offensive DNS attack techniques that they can use against any
Category: Threat Actors
Threat Actors are people who are acting counter to you or your organization’s interest. They are a threat to yourself, your family, your community, your organization (company), your society, and your nation. They cannot be taken for granted. You can classify the world in the four key threat actor categories:
- Cyber-Criminal Threats – Cyber-Crime is an International Legal problem that has no short term resolution. There will always be someplace in the world that is a harbor for cyber-criminal activity.
- Nation State Threats – Post-Snowden, the secret world of nation-state security is now all in the open. Your network is a valid “Battle Space” for any Cyber-War.
- Political, Patriotic, Protestors (P3) – There are always going to be someone, somewhere, who is upset with society – with the ability to make their anxiety know through any network – anywhere.
- Corporate Threats (New!) – The dialog between US & China will accelerate the corporate on corporate threat vector.
Realities of Today’s DDoS Security Risk
Focusing on the lessons from the 2020 – 2021 DDoS Extortion Campaigns DDoS Extortion will not go away. It is a cyclical International crime that can only be stopped with the DDoS Extortionist are arrested. In 2020, organizations woke up to a new wave of DDoS Extortion activities. These attacks caught organizations with the DDoS
Securing Your Network Using Shadowserver’s Daily Network Reports
Securing your Network using Shadowserver Reports helps organizations learn about this unique public benefit tool. What if there was a public benefit, free to use, security report that provided you a complete overview of your security risk? What if this tool allowed you to see what the bad guys are seeing on your network? What
Conference Talks, Workshops, and Webinars
Barry frequently presents at conference talks, workshops, and webinars. Barry enjoys working with peers to share, empower, and entertain with live interactive sessions. Forty years of public speaking experience is reflected in the talks below. Crafted conference talks tuned to the organizer’s audience. The general theme for all the talks is to help people understand,
DDoS Attack Preparation Workbook
Internet DDoS Attacks are a force of nature on the Internet. They are like earthquakes, hurricanes, floods, tornados, tsunamis, and all other disasters. Organizations need to prepare for a DDoS Attack the same way they prepare for severe weather and natural disasters. These guides have been crafted based on my personal experience (+25 years of
DDoS Extortionist’s Behaviors
Smart and prepared organizations use DDoS Extortionist’s Behaviors as a Defensive Tool. We have a long history of DDoS Extortionists. In the early 2000s, we had DDoS Extortionists who would threaten “gambling sites” with a DDoS Attack 30 minutes before a match. This crew was later tracked by law enforcement and arrested. DDoS Extortion has
Conficker Working Group – Archive of Materials
Conficker Still Survives! While public attention to Conficker has faded since the widely publicized April 1st, 2009 “attack date”, the fact is that a huge number of computer systems remain infected with Conficker. As recently as late October 2009, the number of systems infected with the A+B+C variants topped seven million. The Conficker Working Group
Expected DoS Attacks – 10 Steps to Prepare for the Pain
Version 1.0 It is time to prepare for Expected DoS Attacks. There is no perfect anti-DoS solution. But with forethought, planning, coordination, and practice any organization minimizes the impact of the DoS attacks. What follows ten essential steps that have proven to help organizations prepare for DoS attacks. The fundamental principles you will find in
Removing Malware from MACs
Steps by Step Guide to Removing Malware from MACs Removing Malware from MACs is a guide for anyone who has a MAC laptop or desktop. What steps can you take to remove Viruses, Bots, Malware, Unwanted Programs, Plug-ins and Other “unwanted” Software from your MAC OS. These steps also include the precautions for Ransomware. (version
Security Organizations
There are many Security Organizations in the world all working towards the goal of a more secure & resilient Internet. This is an ongoing list of known security organization. Security Groups 10 Years and Older Forum of Incident Response and Security Teams (FIRST) – FIRST is the Forum of Incident Response and Security Teams. The