Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.
What’s lurking in your DNS environment?
As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.
It's been a hot year for DNS. In our 2014 Annual Security Report we take a look at various forms of DNS abuse including DNS amplification, tunneling, exfiltration, and a study of DNS resource exhaustion at a major ISP. In the email space, bootleg Viagra® spam is a staple. This year, Cloudmark commissioned a chemical analysis of various samples from these fake pharmacies to determine just how legitimate and possibly dangerous these pervasive ads might be. Mobile customers have had their own woes this year with the largest targeting of Apple iMessage by spammers seen to date and we completed similar investigative research into this campaign. Our report details an investigation into the origins and on-going legal battle against these spammers and their evolving campaigns.
Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.
This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.
Among the many security failures of the past few months there has been one notable success. The Internet proved that it was robust enough to withstand Papermag.com’s Break the Internet edition. It’s nice to know that while North Korea can take down Sony, and Lizard Squad can put major gaming sites out of business on […]
Cloudmark’s 2015 security predictions included, “As mobile payment systems become more mainstream, they will come under attack from cyber criminals”. It came as no surprise to us to see a report that Apple Pay is now a vector for credit card fraud. The scammers are not compromising existing Apple Pay accounts – so far nobody […]
RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.
"Andrew Conway, a research analyst at security firm Cloudmark, told CBS News he has already begun seeing a flurry of phishing emails disguised as requests from the IRS."
"Hackers claiming to hail from the notorious Lizard Squad group have been gloating online after appearing to take down Xbox Live again with a DDoS attack."
"A huge spam campaign has been installing the Dyreza banking Trojan on tens of thousands of UK computers, specifically targeting those with accounts at major banks."
The world’s top communications service providers turn to Cloudmark to protect their networks.
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.—Veenod Kurup