HTTP Pages Will be Marked as Non-Secure, Source Code for Mirai DDoS Malware Released And More in This Weeks News

Chrome will mark all non-HTTPS pages as non-secure on January 2017

As we all know, Chrome offers users an indicator that marks their connections as secure connections or non-secure connection via an icon in the address bar. HTTPS connections have an extra layer of security while HTTP websites enable potential intruders to modify or look at the site before the user has access to it. The forthcoming Chrome 56 web browser will be marking these as non-secure as of January 2017 and the user will be notified they are entering a website without a secure connection. In the following updates, Chrome will extend the warning to HTTP pages  in Incognito mode and eventually label all HTTP pages as unsecure using the red triangle icon.

Close-up of a web browser address bar displaying a secure HTTPS URL with a lock icon.
Image Source

Read more: Bizety

Book a demo today to see GlobalDots is action.

Optimize cloud costs, control spend, and automate for deeper insights and efficiency.

Book a demo today to see GlobalDots is action.

Source code for DDoS malware Mirai released

The leak of the source code was announced on the English language hacking community called Hackforums and was dubbed “Mirai”. This DDoS malware powers the IoT (Internet of Things) botnet that is responsible for launching a 620 Gbps attack against KrebsonSecurity. Before Krebs, there are reports that major IoT attacks were targeting the 2016 Rio Olympics related websites. The LizardStressor IoT botnet manipulated more than 1,000 webcams to launch 400 Gbps DDoS attacks against gaming sites world-wide, Brazilian financial institutions, ISPs, and government institutions.

The malware dubbed “Mirai” is a DDoS trojan that targets Linux systems. Mirai continuously scans the Internet searching for architectures deployed with IoT devices such as routers, IP-powered cameras, DVRs and so forth. The malware exploits devices that are protected by factory default or hard-coded usernames and passwords, all of which are easily hackable and lack proper security encryption settings. The malware corralled these machines into a massive network under the control of administrator who could execute DDoS attacks and target any websites.

Read more: Bizety, KrebsonSecurity

Insider knowledge on the presidential debate by Fastly

Fastly, which serves thousands of websites, including Buzzfeed, Twitter, and also the Hillary Clinton campaign website has been able to measure website’s traffic surges during the debate. Traffic grew 4600% during the debate broadcast and tripled when the topic of the debate changed to the topic of race as well as when Trump said Clinton “chose to stay home”. Hillary also referenced her website’s fact checkers which also resulted in traffic surges. Overall, traffic to media sites grew by 63% during the debate.

A heated debate scene featuring two political figures passionately discussing issues.
Image Source

Read more: Bizety

By 2017, CMOs will spend more on technology than CIOs

Gartner’s annual CMO spend survey that is soon to be published suggests that for 2016, CMOs allocated 3.24% of revenue to technology spending, while CIOs allocated 3.4%. This means that the prediction from Gartner published several years ago that by 2017, CMOs will spend more on technology than CIOs is coming true.

This is an important finding.

It suggests that marketing technology, once a relatively narrow and specialized adjunct to enterprise IT, is now garnering investment nearly equivalent to the core systems that run the business.
– Jake Sorofman, Gartner

Read more: Gartner Blog

Akamai Acquires Soha Systems

Soha Systems, an innovator in enterprise secure access delivered as a service, has been acquired by an all-cash transaction from Akamai. This acquisition is intended to complement Akamai’s strategy of securing, protecting and accelerating enterprise applications and services in the cloud.

“Enterprise security is undergoing a phase shift and Soha’s secure access service has been designed to address the unique challenges businesses are facing in this era of hybrid data centers and mobile users”

“We look forward to fully integrating our groundbreaking solution as a high-value component of Akamai’s massively scalable, global platform.”
– Haseeb Budhani, co-founder and CEO, Soha Systems

Read more: ITbriefing

Latest Articles

The Security Blind Spot: Business Logic Failures and How to Catch Them

Security leaders know the drill: vulnerability scanners run their course, reports stack up, and yet attackers still slip through. What’s going wrong? We sat down with Yosef Yekutiel, CISO & Data Privacy Officer at MaccabiDent, at GlobalDots’ recent “Red Team Reality Check” event to unpack this gap, and how modern offensive security can fill it. […]

Ganesh The Awesome
27th August, 2025
How NetRefer Cut Observability Costs by €96,000 Per Year in Just 3 Months with GlobalDots

Overview NetRefer, a leading iGaming affiliate marketing platform, utilized Azure cloud-native monitoring tools. Shortcomings needed to be resolved, and the business required next-generation observability.  Problems that needed to be solved: Through GlobalDots’ expertise in selecting and implementing the right observability solution, NetRefer achieved €96,000 in annual savings and gained real-time observability across their entire platform […]

Ganesh The Awesome
24th July, 2025
Vulnerability Assessments vs. Penetration Testing: Key Differences, Use Cases & Best Practices

They’re not interchangeable. A vulnerability assessment identifies known flaws at scale. A penetration test mimics an actual attacker probing for impact. Yet many teams treat them the same. They substitute one for the other, check a compliance box, and move on as if they’re covered. They’re not. And that gap shows up later in real-world […]

Ganesh The Awesome
7th July, 2025
Web Application Firewalls (WAFs): The Evolving First Line of Defense in Cloud Security

Modern applications are built for speed, not simplicity. Containers, microservices, and cloud-native deployments have blown up the security perimeter. Traditional tools can’t keep up with this complexity. That’s why Web Application Firewalls (WAFs) matter. But the WAF of 2025 isn’t just an appliance sitting in front of a static website. It’s a flexible, cloud-aware security […]

Ganesh The Awesome
7th July, 2025

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services