15th November, 2017 2 Min read
Book a Demo
On November 6th for a little more than 90 minutes internet service for millions of users in the U.S. and around the world slowed to a crawl. This time it wasn’t a botnet threat but yet another BGP route leak. A BGP route leak is a router misconfiguration directing internet traffic from its intended path to somewhere else which is definetly a problem, especially when it happens to one of the largest telecommunications network in the world.
Reduce your AWS costs by over 50%
Discover your Cloud Saving Potential – Answer just 5 simple questions. AppsFlyer, Playtika, Lufthansa, IBM, top leading companies are already using our FinOps services.
Read the full report: Dyn Blog
Ragebooter, a service paying customers can use to launch powerful DDoS (Distributed Denial of Service) attacks capable of knocking individials and entire websites offline can now be downloaded on the Google Play Store. The entire story behind this app is a bit more complicated. The creator of Ragebooter is Justin D. Poland who, after prison, still decided to continue running it even though it directly breaks his parole.
In October, the FBI released an advisory warning that the use of booter services otherwise called “stressers” is punishable and may result in arrest and criminal prosecution.
Read more: KrebsonSecurity
Amazon added C5 instances to EC2 which are available in the company’s US East, US West, and EU regions. C5 Instances which are available in five sizes, each offering a different bandwidth for high-powered applications, enable businesses to run compute-intensive applications such as batch processing, distributed analytics, ad serving, high-intensity multiplayer gaming and video encoding.
“Over the years we have been working non-stop to provide our customers with the best possible networking, storage, and compute performance, with a long-term focus on offloading many types of work to dedicated hardware designed and built by AWS”
– Jeff Barr (AWS Chief Evangelist)
Read more: CloudPro
Read more: Bizety
For the last two decades, according to Kaspersky Lab, an incredibly sophisticated threat actor named the “Equation Group” has been active. It caught their eye mainly because of its advanced obfuscation techniques and penchant for encryption algorithms. They’ve documented 500 infections by the Equation Group in 42 countries, which they’re sure is just a tiny percentage of the total because of its built in self-destruct mechanism. Kaspersky Lab named this attack the most sophisticated attack in the world, comparing it to the Death Star in the APT universe. They even went so far and started claiming this is the handwork of NASA.
Read the full story: Bizety
EX.CO is a video technology platform that enables publishers to monetize video content on websites.
Justt is a chargeback mitigation startup based in Tel Aviv. Chargebacks, as defined, are demands by a credit card provider for a retailer to reimburse losses on fraudulent or disputed transactions. Justt’s objective is to assist merchants worldwide in combating false chargebacks using its proprietary artificial intelligence technology.
The cloud used to be viewed as a place of significant cost savings: rather than purchasing and maintaining dozens of server stacks, organizations could outsource this and purchase compute power on an as-needed basis. In the ensuing rush to cloud architecture, however, many companies simply lifted-and-shifted their old financial bad habits. The sheer speed of […]
Cloud computing has transformed more than individual app architectures: it’s granted both start-ups and market leaders an equal platform for innovation. New products are no longer dependent upon complex revenue-draining in-house server stacks. Instead, cloud-native disruptors such as Uber and Airbnb have been able to harness the once-unthinkable degrees of agility, scalability, and cost-efficiency that […]
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.