Security

Security

SYN Flood Attack: Areas of Responsibility and Practical Protection – Provider & Client

SYN Flood remains one of the most popular and dangerous tools in the cybercriminal arsenal. It aims to overload a server with a large number of fake SYN requests, preventing legitimate users from accessing the resource. According to Qrator Labs, in 2023, SYN Flood accounted for about 30% of all DDoS attacks. The reasons are its simplicity of implementation and high effectiveness: even a relatively weak botnet can take down a website or online service if it is unprepared.

Security

What is IDS — Intrusion Detection System

An intrusion detection system is a network security tool that monitors network traffic and devices for malicious or suspicious activity, or security policy violations.

Security

What DDoS attacks are and how a telecom operator can protect against them

A Distributed Denial of Service (DDoS) attack is a cyberattack that aims to render a resource, such as a website or network service, unavailable to its legitimate users. This is achieved by overwhelming the target system with an enormous number of requests that exceed its processing capabilities.

Security

What is DLP? Data Loss Prevention for Critical Business Information

We will tell you what DLP is: how data loss prevention works for critical business information, how to build a DLP policy, what ways to prevent data loss exist, and for which companies it is important.

Security
Solution

Cyberthreat Tracker — Kaspersky and VAS Experts' Solution

Combining their experience in traffic analysis and vulnerability detection, Kaspersky and VAS Experts have created a joint solution, thanks to which operators will be able to ensure network security and additionally monetize their services.

Security
Stingray SG Functionality

How to detect Brute Force in the network

In case Brute force activity with the subsequent BotNet is detected in the network, the telecom operator is threatened with IP address blocking.

Security
Telecom

The botnet spams via routers

Since September 2018, 360Netlab Scanmon has detected multiple spikes in scanning activity on TCP port 5431. Readings were recorded each time the number of connections (scanning attempts) exceeded 100,000.

Security
Telecom

DDOS and 5G: The Thicker the Pipe, the More the Problems

Today, the two most prominent hype points in the telecommunications industry are IoT (Internet of Things) and 5G. Everyone is talking about them, planning, testing, and even deploying them.

Security

Stages of a cyberattack

The development of network technologies has led to an increase in the number of cyberattacks by hackers. According to a report by FireEye and Mandiant, approximately 97% of companies have been subjected to a hacker attack involving the breach of network security measures. Modern firewalls are capable of repelling most intrusions, but some attackers find loopholes thanks to their excellent training and carefully planned actions. Hackers' tactics may vary, but in most cases they involve the following steps.

Security

VPN – connection types and security checks

Virtual private network (VPN) technology allows you to create a secure connection in a potentially dangerous segment of a public network, such as the Internet. The technology was developed to provide remote users with access to corporate network applications, but its development has made it possible to connect company branches into a single network. Let's look at the main ways of organizing a VPN in a corporate network and using a telecommunications operator's network.