As DDoS attack tactics evolve, Communication Service Providers1 (CSP) at the ASN level are facing a new challenge posed by diffused and stealthy volumetric attacks designed to evade detection. The new tactic resembles the way Mongol troops executed battles some 700 years ago. Like the Mongols, today’s perpetrators thoroughly study the targeted landscape prior to mounting their attacks.
The report is a culmination of data based on the Company’s unique threat analysis capabilities. Globally, Q1 showed a significant uptick in business ransomware detections (195 percent), along with continued momentum for Trojan variations by over 200 percent and a sharp decline in crypto mining. In APAC, the region has seen business malware detections on the rise, similar to global trends.
The CSX Threat Hunting Course provides students an in-depth, hands-on, technical training experience wherein they become cybersecurity threat hunters by dealing with real world vulnerabilities, exploitations, and attacks. The course, which covers advanced technical topics ranging from exploitation and threat creation to covert communications hack response, ensures that students are tactically trained and ready to hunt down today’s threat actors in live environments.