sb-as logo
Story image

DDoS attacks are 'no longer isolated events'

Ransomware and malware activation has been discovered within 34% of cyberattacks within APAC, according to Neustar.

This discovery follows Neustar publishing its DDoS Attacks & Protection Report: A Steady Threat in the Connected World,” a research report focused on DDoS attack and protection trends.

The report highlights that DDoS attack volume has remained consistently high and that they could actually do organisations some real damage.

Rob Ayoub, research director of Security Products for IDC, says that Distributed denial-of-service attacks are no longer isolated events limited to large, highly visible, targets.

“Sophisticated attacks hit companies of all sizes, in all industries,” he says.

Neustar conducted the research with respondents from more than 1,000 information security professionals including CISOs, CSOs and CTOs across Asia-Pacific (APAC), North America, Europe, and the Middle East (EMEA).

Among key findings, Neustar points out that DDoS Attacks Are Time-Consuming and Expensive. It can sometimes take hours to detect and mitigate a DDoS attack at major cost to the organisation.

A total of 81% of organisations in APAC took an hour or more to detect a DDoS attack and 72% took an additional hour or more to respond to the attack.

Globally, 49% of surveyed organisations would lose $100,000 or more per hour of downtime during these attacks.

Robin Schmitt, head of  Security for APAC at Neustar, says organisations across Asia Pacific are becoming more digitalised and as a result risk being exposed to increasingly complex and relentless attacks

“IT and business leaders need to realise the potential damage that an attack can cause, and apply adequate security measures that will protect their company from a DDoS attacks.”

Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Five Eyes nations want legal access to backdoors to fight 'illegal content'
The nations argue that encryption can make the enforcement of public safety difficult, particularly when it comes to serious problems like child exploitation. More
Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More