The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
We recently looked at the many types of hackers, but now we take a closer look at which of hacker tends to perpetrate DDoS attacks and why they use this method.
DDoS attacks are one of the oldest types of cyberattacks, but they have still seen a massive growth recently.more →