Pitch Engine

The Times Real Estate

.

Why Headless CMS Is Critical for Cross-Border Brand Consistency: Building One Global Voice Across Many Markets

The larger a brand grows, the easier it becomes to jeopardize consistent communications. Brand experiences are impacted across different languages, cultures, legalities and marketing strat...

Using Structured Content to Build Multi-Step Marketing Funnels: A Scalable Framework for Guided Conversion

Multi-step marketing funnels aim to take users from awareness to conversion and through subsequent stages. Where basic funnels capture all momentum on one landing page, modern marketing ef...

From Pages to Components: How Headless CMS Changes Content Strategy

For years, content strategy was all about pages. Websites were created, written, designed, and optimized one by one, with content closely connected to placement and presentation. It made s...

Supporting Real-Time Interfaces with API-First Content Systems

Real-time interfaces have changed user expectations across many digital solutions. From live data dashboards to conversational interfaces and collaborative platforms, in-app alerts and con...

Biosafety Cabinet vs Ductless Fume Hood: Engineering Safety in Modern Laboratories

Why Containment Equipment Defines Research Integrity The modern laboratory is an environment of controlled risks. Whether handling infectious microorganisms or volatile organic solvents, ...

How Small Businesses Can Compete With Big Brands In Media Coverage?

Corporations with massive marketing expenditures are no longer the sole beneficiaries of media exposure in the contemporary digital era. Small businesses now have access to tools, platforms...

所有攻击中有一半以上采用多个向量组合

 

旧金山Media OutReach - 2018320根据Nexusguard的"2017年第四季度威胁报告",2017年第四季度恶意使用域名服务器(DNS)反射和放大分布式阻断服务(DDoS)攻击次数比2016年第四季度增长了357%以上。通过测量世界各地数以千计的攻击,该季度报告将飙升的攻击归因于启用域名系统安全扩展(DNSSEC)的服务器,若配置不当,会引发重大风险。DNSSEC建立的「信任炼」机制,目的是完善DNS协议的安全性,但由於启动了DNSSEC DNS伺服器,可以产生比查询大很多倍的响应,因此,攻击者能针对此漏洞,向攻击目标大量反射经放大的DDoS攻击。

 

Nexusguard收集与全世界企业及服务供货商网络所面临的威胁相关的实时数据,并以此为依据撰写其DDoS季度报告。Nexusguard通过僵尸网络扫描、蜜罐技术、ISPs(互联网服务供货商)以及攻击者与其攻击目标之间的流量活动来收集数据,从而识别漏洞,并及时了解全球攻击趋势。尽管DDoS攻击的总数与去年同期相比下降了12%,但更广泛的DNSSEC应用中可能会出现一类新的强大的僵尸网络。Nexusguard警示相关团队评估DNSSEC响应和安全漏洞,以加强系统防范未来攻击的能力。

 

Nexusguard首席技术官Juniman Kasman表示"企业努力打击窥探、劫持及其它DNS滥用行为;然而,配置不当的DNSSEC启用域名服务器可能会成为无准备团队的新瘟疫。管理员和IT团队需要检查整个网络的安全性,并在域名上正确配置DNSSEC,以便适当强化服务器以抵御这些新攻击。"

 

根据Nexusguard"2017DDoS攻击情况"的信息图,可以看出黑客也将继续支持多矢量攻击;在过去的一年中,超过一半的僵尸网络中融合了网络时间协议(NTP)、通用数据报协议(UDP)、DNS及其它流行攻击向量的组合。中国和美国继续在第四季度成为DDoS攻击的两大来源,分别占僵尸网络的21.8%和14.3%。韩国攀升至第三位,占全球攻击的近6%,高于上季度的第六位。

 

详情请看完整"2017年第四季度威胁报告"

 

关于Nexusguard

成立于二○○八年,Nexusguard为对抗恶意网络攻击的全球领导性厂商。保护客户免受分布式阻断服务(DDoS)攻击及多种网络威胁,确保网络服务不受干扰。Nexusguard 致力为世界各地不同产业及规模的客户提供全方位、高度定制化的网络安全解决方案,并且为网络服务供货商提供全面性DDoS防御项目及支持服务。Nexusguard信守承诺,通过最大限度地减少威胁和提高正常运行时间,让客户安心。欲了解更多请访问网站www.nexusguard.com

Source http://www.media-outreach.com/release.php/View/5058#Contact