WebRoot Quarterly Threat Update
According to update, throughout 2016, phishing attacks increased in intensity and sophistication. One of the leading causes of network infiltration and data theft is phishing, and mostly deceptive email used for that purpose.
Online criminals send emails which appear to originate from trusted institutions or banks. When links present in the emails clicked, the attacker establishes a beachhead and gathers information for an attack on the critical system.
Secure Content Delivery Network
It simplifies the delivery of secure web applications for developers. There is a global network of Content servers in various parts of the globe protected with web application firewall (WAF) and DDoS mitigation setup.
Users offered with real-time analytics and 24/7 support. Most of the companies charge on pre-paid bandwidth.
CentOS 5 reaching End-of-Life
CentOS 5 reaching EOL (end-of-life) on 31st March 2017, after that software developer will stop supporting it and deprecate its use.
The CentOS released in April 2007 received full updates till 2012 after that only maintenance and security updates were received.
With this, cPanel would also no longer support it. Continuing with non-supportive and un-maintained OS can lead to security vulnerabilities and won't be fixed.
Free public Domain Name Service system
Safe DNS service ‘Quad9' blocks malicious domains associated with botnets, phishing attacks, and other malicious Internet hosts. It would not return name resolutions for sites identified via 19 threat feeds—one of which is IBM's X-Force that the service aggregates daily.
Internet Protocol address 18.104.22.168 would serve public DNS server like Google. The service launched by The Global Cyber Alliance (GCA), a non-profit law enforcement and research organizations partnered with IBM and Packet Clearing House.
About GCA (The Global Cyber Alliance )
Fight against cyber crime
Chief Technical Advisor: Adnan Baykal
Major Cyber Security Attacks
Spectre and Meltdown Vulnerability
The vulnerability is hazardous for multi-tenant systems like the public cloud, which hosts several users on the same server.
Protection: Update Operating System. Microsoft, Linux distributions including CentOS and Ubuntu released patches to mitigate the risk.
The National Cyber Security Centre (NCSC)
Chief executive: Ciaran Martin
Try to keep individual users safe from cyber attacks. Its Haulster operation automates defense of credit cards by flagging fraudulent intention against them and returns information about them to banks. They are thus allowing financial institutions to protect users from their money being stolen.
Its Active Cyber Defence (ACD) strategy designed to ensure fewer cyberattacks in the world, causing less harm to users in the UK and beyond in the process.
Takedown service: They contact the web host and get malicious websites removed from the Internet, thus stops phishing and other malicious activities.
The NCSC Annual Review 2019 reveals that the cyber arm of GCHQ helped UK organizations to fight over 658 incidents of malicious cyber activity in the last 12 months, providing support to almost 900 victims of cyberattacks. The attacks include stealing intellectual property from universities, a ransomware attack against the police, and phishing scam posing as an airport refund email that attempted to defraud over 200,000 people.
Since 2016, the NCSC has dealt with 1,800 incidents posed by cyber-criminals and other malicious threat groups. The attacker's top target is Government, followed by academia and tech companies, managed services, and then transport and health.