It would be easy to keep important things secure from prying eyes if you sealed them in a box and chained the box to the bottom of the ocean. The tradeoff, of course, is that you would completely lose the […]
It would be easy to keep important things secure from prying eyes if you sealed them in a box and chained the box to the bottom of the ocean. The tradeoff, of course, is that you would completely lose the […]
The last year was another active one for the DDoS attack space. The common themes of recent years — increased complexity, frequency and scale — continued to drive the space with actors shifting and adopting tactics, techniques and procedures (TTPs), […]
In recent years, Distributed Denial of Service (DDoS) events have become an ever-present threat, featuring attack traffic pushing to levels measured in terabits per second (Tbps). One of the key tools in the hands of cybercriminals seeking to increase the […]
If there’s one call a CISO never wants to get, it’s the news that operations are shutting down across the company because ransomware has locked access to critical files. While Lumen regularly works with companies to deal with successful ransomware […]
Two decades is an eternity on the internet. When a Canadian teenager launched one of the first distributed denial of service (DDoS) attack to target large corporations at the turn of the century, it was little more than a novelty. […]
Just a few years ago, few companies had ever heard of ransomware. Today, it has become a cybersecurity scourge. This article, the first of a three-part series on this cybersecurity threat, explores what it is, how it evolved, and why […]
Black Lotus Labs’ analysis has uncovered a cluster of compromised websites previously used in a series of watering hole attacks. Any visitors who browsed to one of the sites would unknowingly be infected and vulnerable to the threat actor stealing […]
For years, companies have used content delivery networks (CDNs) to deliver content as close to their users as possible. This is becoming more challenging. The pandemic has accelerated remote access and spiked both traffic volumes and security threats. The CDN […]
Customers should verify their IP indexes to prevent traffic from being dropped When you clicked the link to read this blog, you triggered a series of actions that directed your data across the internet to this page using the most […]
As the toll of the pandemic continues to plague nearly every sector of the economy, the cybersecurity landscape is seeing attack after attack from bad actors that are finding opportunities to capitalize on the chaos. As such, the demand for […]