Posted on January 04, 2017 by Yury Sergeev
Posted on October 18, 2016 by Nikolay Arefiev
When you use the Internet for your business, you are confronted with a task of protecting your Internet resource. Some small Internet-based companies believe that if they don’t store the customer payment information at their web resource, no hacker attack can significantly harm their business. However, nowadays there are exist attacks that indirectly influence all participating parties, even though your resource may not have been the target of the attack.
Posted on July 21, 2016 by Yury Sergeev
Hackers are using new sophisticated botnet-driven SEO attacks to promote adult sites and online pharmacies. Web search engines use different algorithms to rank a site, but one of the most significant parameters is how many sites contain links to the website, and how high-ranked are these sites. Therefore, attackers exploit hundreds of websites to increase the search engine ranking of sites which they promote by injecting links.
Posted on July 07, 2016 by Yury Sergeev
Today, online business is affected by numerous attacks. Some of them are performed by people and some by bots which are simply software applications that run different automated tasks to compromise websites. However, both use dynamic IP rotation as a way to evade security solutions using Tor networks and open proxies to disguise their real IP addresses. In that case, as defenders, we should use threat intelligence data to check IP reputation of visitors and if we have special software to protect web applications from attacks, configure our security systems to block malicious human and bot traffic.
Recent PostsSecuring Websites with Threat Intelligence API