January 26, 2022
IDEMIA partners with Microsoft to provide next-gen eSIM services
“The combination of the IDEMIA and Microsoft Azure expertise will enable us to deliver the best-in-class eSIM Remote Subscription Management services that secure connectivity for consumers, devices and citizens across the world,” says EaChaillioux.
May 11, 2021
Communications Service Providers should not let IPv4 exhaustion stop growth
By using architecture models like NAT44 or NAT444, CGNAT can expand IP address pools by 40 – 60x or more. This helps communications service providers support new subscribers and drive growth without the need to purchase new IPv4 numbers on the open market, or to upgrade or enhance home modems, routers, or cellular phones.
May 26, 2020
Financial services organizations increasingly prone to DDoS attacks
F5 Labs’ analysis, which examined customer security incident response (SIRT) data from 2017-2019, covered banks, credit unions, brokers, insurance, and the wide range of organisations that serve them, such as payment processors and financial Software as a Service (SaaS).
November 8, 2022
The Rise of Botnet and DDoS Attacks
Distributed Denial of Service (DDoS) attacks have become an ongoing threat for organisations. Using a variety of techniques, a wide range of threat actors from lone hackers, criminal gangs and hacktivists to nation-states are using DDoS attacks to disrupt or disable the performance of target systems.
August 8, 2022
Crypto-collapse and rising smart attacks: Kaspersky reports on DDoS in Q2
During Q2 2022, Distributed Denial of Service (DDoS) attacks reached a new high as the proportion of smart attacks and average duration increased dramatically. The average duration of a DDoS attack increased 100 times over the previous year, reaching 3,000 minutes. Smart attacks nearly broke the four-year record, accounting for nearly half of all attacks.
November 1, 2021
Hero to villain and loyal sidekick of the cybercriminal
Cybercriminals use a variety of techniques and attacks. Sometimes they want to be seen, they want to cause demonstrative damage, for example in Distributed Denial of Service (DDoS) attacks on websites. Sometimes they want to distract attention from other attacks or just to test their skills, show their strength and make headlines.