Press enter to see results or esc to cancel.

The platform is under extreme load:’ Cyber attack brings major cryptocurrency exchange to its knee

One of the largest cryptocurrency exchanges shut Tuesday morning because of a cyber attack. “The platform is under extreme load,” Bitfinex said at 9:39 a.m. ET. Bitcoin was trading slightly lower at $7,421 a coin, according to Markets Insider data. ¬†Bitfinex, one of the largest cryptocurrency exchanges by trading volumes, was down Tuesday morning after …

Continue reading

The White House’s battle against botnets

The Trump administration’s new report on botnets, which are networks of hijacked computers and devices that can unleash increasingly destructive cyber attacks, is a prelude to a cybersecurity strategy that will test the will and resourcefulness of federal agencies and private industry alike. “If this doesn’t work, we’re screwed,” said one industry source who has …

Continue reading

The White House’s battle against botnets

The Trump administration’s new report on botnets, which are networks of hijacked computers and devices that can unleash increasingly destructive cyber attacks, is a prelude to a cybersecurity strategy that will test the will and resourcefulness of federal agencies and private industry alike. “If this doesn’t work, we’re screwed,” said one industry source who has …

Continue reading

Web Application Firewalls Adjust to Secure the Cloud

Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here’s what to keep in mind as you browse the growing market. As the application landscape changes, so do the tools we use to protect corporate systems and the data they process. The evolution of the Web Application Firewall (WAF) is a prime …

Continue reading

Web Application Firewalls Adjust to Secure the Cloud

Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here’s what to keep in mind as you browse the growing market. As the application landscape changes, so do the tools we use to protect corporate systems and the data they process. The evolution of the Web Application Firewall (WAF) is a prime …

Continue reading