The distributed denial-of-service (DDoS) which knocked KrebsOnSecurity offline for days cost owners of devices unwittingly involved in the attack upwards of $300,000, researchers suggest. The DDoS attack took place in 2016 and was made possible through the Mirai botnet, a network of enslaved Internet of Things (IoT) devices including routers, surveillance cameras, and smart home systems. Non-existent or poor security practices, including the use of hardcoded and factory passwords, allowed the operators of the botnet to scour the web for the means to hook up and enslave these devices, providing the bandwidth necessary to launch an attack able to smash the KrebsOnSecurity domain and prevent legitimate traffic from getting through. The access disruption was an annoyance for visitors and a severe headache for Akamai, which used to host the renowned security expert's blog pro bono. The cost of the attack to the cloud security provider in fending off the 620 Gbps DDoS assault, which could have eventually reached millions of dollars, led to Google's Project Shield offering to take on the blog.
WALTHAM, MA--(Marketwired - Jun 23, 2016) - CloudLock, the leading provider of Cloud Access Security Broker (CASB) and Cybersecurity-as-a-Service solutions, today announced the release of the next generation of its innovative machine learning capabilities to include suspicious login activity monitoring, location-based anomaly detection, and IP reputation analysis to identify anomalies, zero in on suspicious behavior, and pinpoint true threats across SaaS, IaaS, PaaS, and IDaaS cloud platforms. The inability to detect real threats from millions of alerts they receive daily as well as the lack of timely response capabilities are the greatest challenges facing security teams today. Pioneered by CloudLock's research intelligence arm, the CyberLab, machine learning capabilities are the foundation of the Cloud Security Fabric, helping security teams narrow their focus on user activities indicative of true threats. Using the company's Cloud Threat Funnel methodology, along with big data technologies and multiple advanced clustering algorithms, CloudLock's machine learning technology continuously evolves based on analyzing the industry's largest data set spanning over one billion files and events monitored daily. CloudLock's expanded machine learning capabilities include: Suspicious Login Activity Monitoring captures high frequency login anomalies, such as login failures and login challenges from unusual devices, geographies and time periods for a given user, indicate potential threats to corporate user accounts.
Western Digital expands its surveillance hard drive portfolio with new 10TB and 12TB drives that are purpose-built for the emerging DVR and NVR systems that feature Artificial Intelligence (AI) capabilities. See also: iOS 12 beta: Should you run it? Is it faster than iOS 11? Will it break your iPhone? Hard drives built specifically for video surveillance systems are not new, and are engineered for high-temperatures, 24/7 running, and reliability. The Western Digital Purple range is no exception, built for workloads of 360TB/year, and support for 64 cameras.
How would you protect the US against Chinese cyberattacks? Would you push for stricter security standards, or new encryption technology? The Trump administration's national security team has another idea: a government-controlled 5G network. Axios has obtained documents showing that the team is pushing for a centralized, secure 5G network within 3 years. This would create a secure communications avenue for self-driving cars, AI, VR and other budding technologies. Just how it would be built is another story, however.