Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.
This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.
Apart from LDAP, attackers use other protocols to increase the scope of their DDoS offensives. Last year the most used were NetBIOS, RPC, Sentinel, DNSSEC and TFTP.
Source: Redes Zone
SHARE
Recent posts
Many organizations focus their technology investments on infrastructure, cloud, or cybersecurity, but often overlook a key factor: the hidden costs associated with the digital workplace.
The integration of artificial intelligence agents is transforming business operations, driving automation, service personalization, and productivity improvements. However, their incorporation into critical processes also expands the attack surface and requires organizations to rethink traditional security models.
The digitalization of the workplace has become a key factor in ensuring continuous care in the healthcare sector, especially during periods of high demand.
Professionals around the world are combining work and leisure time thanks to workplace virtualization. Companies like Virtual Cable, with its UDS Enterprise solution, facilitate remote access to entire work environments. From anywhere with an Internet connection: a beach, a country house, or any country in the world.
The choice of technology infrastructure is crucial for the growth and competitiveness of businesses. This article analyzes the advantages and disadvantages of “on-premises” and “cloud computing” models, focusing on aspects such as costs, scalability, security, and management.
The definition of “on-premise” refers to the implementation of servers and an IT environment that are either owned exclusively by the company or rented by it.
Stay up to date with all the news from UDS ENTERPRISE through our social networks.
0 Comments