Read more about Qualys
Bookmark and Share
  • Free guide: The Top 10 Reports for Managing Vulnerabilities

    18.09.2013

    This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure.

  • Is BEAST still a threat?

    10.09.2013

    I changed the SSL Labs rating criteria to stop penalizing sites that do not implement server-side mitigations for the BEAST attack.

  • Defending against the BREACH attack

    08.08.2013

    When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response bodies (via HTTP compression) in particular.

  • Qualys announces WAF Beta for Amazon EC2

    31.07.2013

    Qualys will release the beta of its new cloud WAF solution as an Amazon Machine Image (AMI) and as a VMware virtual image for on-premise deployments starting August 1.

  • Don't get pwned at Black Hat, DEF CON

    29.07.2013

    I am not a paranoid person and most industry conferences I go to don’t generate any worries about security.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //