An email has been sent to your address with instructions for changing your password.
There is no user registered with this email.
Sign Up
To create a free account, please fill out the form below.
Thank you for signing up!
A confirmation email has been sent to your email address. Please check your email and follow the instructions in the message to complete the registration process. If you do not receive the email, please check your spam folder or contact us for assistance.
Welcome to our platform!
Oops!
Something went wrong while trying to create your new account. Please try again and if the problem persist, Email Us to receive support.
A10 Networks’ Threat Research Detects and Tracks Origins of DDoS Weapons; Observes Over 15 Million Weapons
Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Negative)
Tags
Rhea-AI Summary
A10 Networks highlights the alarming rise in cyber threats, particularly DDoS attacks, tracked by their security research team, which identified over 15.4 million DDoS weapons in 2021. This surge is linked to the Russia-Ukraine conflict and significant vulnerabilities like Log4j. The company urges organizations to implement Zero Trust principles for enhanced security. Their DDoS protection solutions received recognition from Frost & Sullivan, affirming their commitment to cybersecurity and global cooperation through memberships like the Microsoft Intelligent Security Association.
Positive
Recognition from Frost & Sullivan for DDoS protection solutions.
Tracking over 15.4 million DDoS weapons showcases A10's analytical capabilities.
Partnership with Microsoft Intelligent Security Association enhances cybersecurity offerings.
Negative
The spike in cyberattacks indicates increasing threats to security.
Organizations Increasingly Employ Zero Trust Principles to Protect Digital Infrastructure
SAN JOSE, Calif.--(BUSINESS WIRE)--
It is well-reported that the pandemic caused a spike in cyberattacks, including malware, ransomware and DDoS attacks. Threat actors have sought to disrupt not only services people rely on every day like healthcare, education and financial but also critical infrastructure, like food supply chains, utilities and government agencies. Correspondingly, there has been a dramatic increase in the weapons that can be used to launch these attacks. In the 2H 2021 reporting period, A10 Networks' security research team tracked over 15.4 million DDoS weapons in 2021. Recently, A10 Networks’ threat intelligence detailed the use of DDoS attacks to disrupt infrastructure and communications in Ukraine in February 2022 just as Russia launched its ground attack.
A10's DDoS Threat Report (Graphic: Business Wire)
A10’s threat intelligence research team monitored significant advances in scope and intensity of cybercrimes.
DDoS weapons are on the rise: 15.4 million are now tracked by A10 security research team
There was an increase of over 100 percent, year-over-year, of more obscure potential amplification weapons, including Apple Remote Desktop (ARD), which was used in the Russia-Ukraine conflict
Attackers have leveraged the now well-known Log4j vulnerability; more than 75 percent of Log4j scanners originated in Russia
These, and other trends, are included in the 2022 A10 Networks DDoS Threat Report, which provides detailed insights, including the origins of DDoS activity; the growth of DDoS weapons – the computers, servers and IoT devices that can potentially be used in DDoS attacks – and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities.
Organizations Must Act Now – Employ Zero Trust Principles
On March 21, 2022, the Biden-Harris Administration issued guidance urging U.S. organizations to act quickly to protect against cyber attacks and state-sponsored cyber warfare given the ongoing Russia-Ukraine conflict.
The guidance, while aimed at U.S.-based organizations, details a sense of urgency for organizations globally to reevaluate their security posture. Employing Zero Trust principles can not only protect networks but also ensure that they are not being used to launch attacks. A10’s security-led solutions for DDoS protection, TLS/SSL inspection of encrypted traffic and application delivery security capabilities can provide identity-based and context-based Zero Trust policies for specific enforced access.
“Recent events underscore the often devastating impact that cyberattacks have on governments and businesses around the world. A10 Networks tracks the origins of DDoS weapons activity, in addition to other attack vectors, in order to arm customers with useful threat intelligence. This is a critical component of a Zero Trust framework to help organizations better anticipate and mitigate cyber attacks, and also ensure networks are not inadvertently being weaponized,” said Dhrupad Trivedi, president and CEO of A10 Networks.
In addition, to further support our customers’ cybersecurity needs and contribute to global solutions to cyber threats, A10 recently joined the Microsoft Intelligent Security Association (MISA), which is an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats.
A10 Networks (NYSE: ATEN) provides secure application services for on-premises, multi-cloud, and edge-cloud environments at hyperscale. Our mission is to enable service providers and enterprises to deliver business-critical applications that are secure, available, and efficient for multi-cloud transformation and 5G readiness. We deliver better business outcomes that support investment protection, new business models and help future-proof infrastructures, empowering our customers to provide the most secure and available digital experience. Founded in 2004, A10 Networks is based in San Jose, Calif. and serves customers globally. For more information, visit www.a10networks.com and follow us @A10Networks.
The A10 logo and A10 Networks are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are the property of their respective owners.