Profile cover photo
Profile photo
Distil Networks
73 followers
73 followers
About
Distil Networks's posts

Post has attachment
[Case Study] One of the world’s leading hotel booking websites assists anyone looking to book hotel accommodation. Through web scraping, the hotel booking website’s competitors were acutely aware of its price offerings. After exfiltrating the company’s data, the scrapers would then use this data to adjust their pricing to be slightly cheaper. Other challenges included website slowdowns and downtime due to application denial of service and Bots skewing look-to-book ratios by flooding wholesalers with API requests. Read More: http://ds.tl/2dHiSEB


Post has attachment
Automated threats on websites opens up many industries to exploitation of business processes including cyber-fraud. From banks to popular airlines, businesses are poised to lose millions in revenue if they’re not properly protected against these automated attacks. In layman’s terms, automated threats are those undertaken by bots. Thankfully, Distil Networks successfully stops all of the OWASP Top 20 automated threats! #bots #security

Read More: http://ds.tl/2dYHxmY


Post has attachment
[Case Study] One of the world’s leading hotel booking websites assists anyone looking to book hotel accommodation. Through web scraping, the hotel booking website’s competitors were acutely aware of its price offerings. After exfiltrating the company’s data, the scrapers would then use this data to adjust their pricing to be slightly cheaper. Other challenges included website slowdowns and downtime due to application denial of service and Bots skewing look-to-book ratios by flooding wholesalers with API requests. Read More: http://ds.tl/2dYGfbB


Post has attachment
Automated threats on websites opens up many industries to exploitation of business processes including cyber-fraud. From banks to popular airlines, businesses are poised to lose millions in revenue if they’re not properly protected against these automated attacks. In layman’s terms, automated threats are those undertaken by bots. Thankfully, Distil Networks successfully stops all of the OWASP Top 20 automated threats! #bots #security

Read More: http://ds.tl/2dHiXYS


Post has attachment
Dubbed Mirai, the malware is a #DDoS Trojan that targets BusyBox systems, a collection of Unix utilities specifically designed for embedded devices like routers. The malware is programmed to hijack connected #IoT devices that are using the default usernames and passwords set by the factory before devices are first shipped to customers. Spotted by Brian Krebs, the "Mirai" source code was released on Hackforums, a widely used hacker chat forum, on Friday. #Mirai

Read More: http://thehackernews.com/2016/10/mirai-source-code-iot-botnet.html

Post has attachment
Courtney Nash recently sat down with John Bullard and Benji Taylor from Distil Networks to discuss their path to Payment Card Industry (PCI) security standards compliance and the role DevOps played in their journey. Here are some highlights from their talk: https://www.oreilly.com/ideas/a-devops-approach-to-pci-compliance


Post has attachment
In our effort against bad bots, we used information theory in a study of comparing fonts installed on 1.2 million computers to find spam.

View our findings here: http://resources.distilnetworks.com/h/i/290817705-can-comic-sans-detect-cyber-attacks/177658

Photo

Post has attachment
Automated threats on websites opens up many industries to exploitation of business processes including cyber-fraud. From banks to popular airlines, businesses are poised to lose millions in revenue if they’re not properly protected against these automated attacks. In layman’s terms, automated threats are those undertaken by bots. Thankfully, Distil Networks successfully stops all of the #OWASP Top 20 automated threats! #bots #security

Read More: http://resources.distilnetworks.com/h/i/282542127-distil-stops-100-of-the-owasp-top-20-automated-threats/181642


Post has attachment
[eBook] Cyber Security Threat Series: Account Takeover – Comprehensive threat breakdown & mitigation techniques #Security #ITSec #DataSec

Read Now: http://resources.distilnetworks.com/h/i/290572467-cyber-security-threat-series-account-takeover-ebook/185088

Post has attachment
Do you know — Your Smart Devices may have inadvertently participated in a record-breaking largest cyber attack that Internet has just witnessed. If you own a smart device like Internet-connected televisions, cars, refrigerators or thermostats, you might already be part of a botnet of millions of infected devices that was used to launch the biggest #DDoS attack known to date, with peaks of over 1 Tbps of traffic. France-based hosting provider OVH was the victim to the record-breaking Distributed Denial of Service (DDoS) attacks that reached over one terabit per second (1 Tbps) over the past week.

Read More: http://thehackernews.com/2016/09/ddos-attack-iot.html
Wait while more posts are being loaded