Skip to main content

Posts

Showing posts from May, 2023

BOT attacks: a growing threat on the Internet

Bot attacks , the malicious and damaging use of automated computer programs known as bots (or BOTS), have become a growing concern and a pervasive reality in the modern digital landscape. BOTS, or software robots, are automated programs originally designed to perform tasks on the Internet without human intervention. Unfortunately, hackers have also managed to turn them into a hacking technique, created with malicious intent, to manipulate, defraud or disrupt a site, application, API or users, potentially causing enormous damage to businesses and users, compromising the security of systems and data. To carry out their BOTS attacks, the majority of hackers use software called botkits, which are freely available online and sold on the Dark Web. Vendors of this type of software also offer paid services to carry out BOT attacks, including software to power DDoS attacks. BOT attacks include, but are not limited to,  Email Spam , which is used to send spam emails containing malicious soft...

SECURITY OF DIGITAL PAYMENTS

LexisNexis Risk Solutions has just published its study on cybercrime in the year 2022 pointing to a 20% annual increase in the rate of digital attacks worldwide with significant peaks in Asia-Pacific, Latin America and North America at the end of the year. The study, which is based on the analysis of 79.8 billion transactions, highlights that alternative payment methods, such as digital wallets, QR code payments and person-to-person transfers, continue to grow in popularity, particularly in the  Asia-Pacific  region with a  50%  year-on-year increase in the region's payment attack rate. The implication, according to Stephen Topliss, Vice President of Fraud and Identity Strategy, is that "multi-factor authentication alone as a defence is inadequate in today's digital world. Organisations, industries and countries need to collaborate and identify the interconnected signals of complex fraud attacks, as criminal networks working in a structured manner are here to stay. T...

WHAT IS ARCHANGEL 2.0 NGFW AND HOW IT IS WORKING

WHAT IS ARCHANGEL 2.0 NGFW AND HOW IT IS WORKING Our approach of the security is totally different from what does exist on the market. We put ourselves in the shoes of the hacker to know how he is proceeding to deploy a malware or virus in a system or to Exfiltrate its data.   THE PRINCIPLES The fundamental principles on which our defence system is based are  ZERO TRUST  and  MICRO-SEGMENTATION , as well as the rule that nothing can enter the private network without system authorisation. -         ZERO TRUST  because we do not trust users at any level. Isn't the human factor the weakest part of a security system? The system is therefore designed to give the best security even if the network is potentially subject to human error. -         MICRO SEGMENTATION  in order to limit the devastating effects that an attack could have by circumscribing it to a single sector which is possi...