Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.
This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.
Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
Virtual desktop infrastructure plays a fundamental role in remote and hybrid work models by providing workers with flexibility and mobility without compromising security or performance.
The term “Cloud Computing” refers to the use of computing resources (servers, storage, computing capacity, databases, networks, software) over the Internet.
Discover the advantages of virtual desktops: the solution that redefines remote work by allowing access to the work environment at any time, from anywhere, and from any device.
We explain in depth what Virtual Desktop Infrastructure (VDI) is, its advantages, types, implementation and how you can digitize your company’s workplaces with this solution.
Much of the success of technological evolution goes through virtualization. A concept that, outside the technical world, is becoming more widespread. It hides a power that, up to now, we have only timidly begun to explore.
In recent years, much has been written about the advantages of virtualization and the many benefits it brings to companies; especially, after the strong irruption of remote working driven by the pandemic.
Stay up to date with all the news from UDS ENTERPRISE through our social networks.
0 Comments