You searched for
Denial of Service
https://www.stormshield.com/news/energy-infrastructure-facing-up-to-the-cyber-threat/
Digital transformation has brought undeniable benefits to the energy sector in terms of flexibility and streamlining of the distribution network. At the same time, however, it has introduced significant vulnerabilities, creating additional points of entry to an already extensive physical area spanning energy production, transmission...https://www.stormshield.com/news/fileless-malware-how-does-it-work/
The first appearance of a fileless malware attack is said to date back to 2001. And despite peaks in activity in 2017, 2019 and 2021, these fileless attacks are still largely misunderstood, and raise questions about how they work. But what are the technical characteristics...https://www.stormshield.com/news/how-do-you-combine-ethics-and-cybersecurity/
Extraordinary responses to extraordinary times: in early March, hacker groups announced a ceasefire during the Covid-19 health crisis. Despite this, on March 16, the US Department of Health and Human Services suffered a distributed denial-of-service (DDoS) attack. And on March 22, in France, while overcrowded...https://www.stormshield.com/news/what-cybersecurity-trends-will-2019-bring/
What does 2019 have in store for us? In 2018, the world of cybersecurity certainly saw its share of surprise cyberattacks, zero-day attacks, and other methods ranging from the new to the familiar. In an attempt to forecast the trends for 2019, we've gathered information...https://www.stormshield.com/news/malware-a-retrospective-of-2018/
While 2018 was free of massive attacks splashed on the front pages of newspapers, it did see the emergence of a host of new malware threats. The malware was in many cases highly sophisticated, but still did not manage to replace good old ransomware, from...https://www.stormshield.com/news/trust-the-foundation-of-europes-digital-sovereignty/
Europe has a number of assets it can use to strengthen its digital sovereignty. But security and trust are two crucial aspects needed to truly begin this process. Digital sovereignty at the heart of events As 2018 comes to a close, questions of digital...https://www.stormshield.com/news/small-businesses-and-cyber-attacks-the-10-most-common-threats/
Connected but often with little protection, small businesses are manna from heaven for cyber-criminals and hackers. E-mails, wifi network, USB keys, etc. Discover the 10 most common entry points in micro, small and medium-sized businesses. E-mail E-mail is undoubtedly the most common means by...