Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.
This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.
Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
The choice of technology infrastructure is crucial for the growth and competitiveness of businesses. This article analyzes the advantages and disadvantages of “on-premises” and “cloud computing” models, focusing on aspects such as costs, scalability, security, and management.
The definition of “on-premise” refers to the implementation of servers and an IT environment that are either owned exclusively by the company or rented by it.
8 out of 10 rural workers seek improved telecommunications infrastructure
With the growing trend of multiple job holders reaching historic highs in many countries, workplace virtualization is vital for attracting and retaining talent in this new work environment.
Virtual desktop infrastructure plays a fundamental role in remote and hybrid work models by providing workers with flexibility and mobility without compromising security or performance.
The term “Cloud Computing” refers to the use of computing resources (servers, storage, computing capacity, databases, networks, software) over the Internet.
Stay up to date with all the news from UDS ENTERPRISE through our social networks.
0 Comments