Tips to squash smishing (SMS phishing)
Allot Blog
by Avi Hein
1y ago
No matter how robust the network security infrastructure is, an error in judgment can open the floodgates for cyberattacks. Deceiving a user into revealing sensitive information, primarily over email, is called phishing. When phishing is done using SMS, it is called smishing. There has been an uptick in smishing ever since the pandemic, with reports estimating a 328% spike. What is Phishing? Phishing is an attempt by fraudulent actors to pass off as a legitimate business or entity to extract personal information or install the malware in the victim’s system. Usually, email or phone calls are u ..read more
Visit website
Log4Shell is the worst security issue of the decade: what you should do
Allot Blog
by Ami Barayev
1y ago
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with us for a while. So, here is an update of what we know so far, with the latest information.   Log4shell summary overview December 10, 2021 – The original Log4Shell vulnerability was disclosed under CVE-2021-44228 with the possibility for an attacker to execute injected code using the message lookup functionality. Affected versions were Log4j v2.0-2.1 ..read more
Visit website
What is mobile security?
Allot Blog
by Avi Hein
1y ago
The use of smartphones has surged, but the users’ knowledge regarding the security of mobile devices has not kept pace with this uptick. To put things into perspective, a study claimed almost 97% of organizations tackled mobile threats in 2020; further, 46% of companies found at least one employee had a malicious application installed on their phones. At a time when smartphones have become universal, ensuring their safety is not optional but a necessity. Mobile security aims at protecting a whole gamut of gadgets, including smartphones, tablets, and laptops, from security threats. With people ..read more
Visit website
CSPs reveal what’s really happening with 5G
Allot Blog
by Michael Schachter
1y ago
Over the years, the team here at Allot has amassed quite a library of Telco Trends Reports, which we publish as important developments occur within the industry. Our latest report dives in deep to reveal where communications service providers (CSPs) are on the path to rolling out 5G. Entitled “The 5G Journey: Where are we now and where are we heading?” this Telco Smart Trends Report presents the interesting results gathered from a recent, anonymous survey of Tier-1 and Tier-2 mobile network operators. Before we jump into the “what is being deployed, where, and when,” it’s interesting to look a ..read more
Visit website
Understanding user intent – the panacea for mission-critical application QoE issues
Allot Blog
by Ami Barayev
1y ago
In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT network traffic serve us well to explain the pains and optional solutions, we’ll also continue to use them in this blog post. In the real traffic world, a traffic jam happens due to one or more of the following reasons: Road capacity does not succeed in containing the number of vehicles Traffic lights are not appropriately tuned to reflect the dynamic changes in traffic load during the day hours and days ..read more
Visit website
What is ZuoRAT?
Allot Blog
by Avi Hein
1y ago
ZuoRAT is a remote access trojan (RAT) that attacks small office/home office (SOHO) routers. On June 29, 2022, Black Lotus Labs, the threat intelligence arm of Lumen Technologies, revealed the existence of this vulnerability. The code appears to be a heavily modified version of the code behind the Mirai botnet. The source code for Mirai was released in 2016. According to the security researchers, the threat targeted North America and Europe, and may have remained undetected for two years. The attacks started in October 2020 and targeted known vulnerabilities in routers from ASUS, Cisco, DrayTe ..read more
Visit website
A look back at Infosecurity 2022
Allot Blog
by Barry Spielman
1y ago
Whew, I just returned from London after having attended Infosecurity, Europe’s largest cybersecurity conference. While my legs are tired from so much walking due to the rail strike – the largest in the UK in three decades – it was amazing to come together face to face after several years of cancellations and virtual conferences. It was great to be among many of the world’s top security companies, meet with potential customers, and mix and mingle. I also had the opportunity to meet many people at my session on Thursday. What else took place? The conference opened with a keynote discussing the ..read more
Visit website
Do we really need 5G?
Allot Blog
by Yaakov Stein
1y ago
As I mentioned in a previous blog post, 4G is really pretty good. It makes quite a few useful things possible: fast general Internet access (on the order of DSL) download and even upload of high-resolution video always-on behavior (with batteries lasting the entire day) apps relying on location and identity (technically a smartphone feature). As a testament to this success, there are well over 700 commercial 4G networks deployed across the world, covering more than 80 percent of the global population. So, why do we really need 5G? It’s interesting to mention that 5G wasn’t developed, like 3G ..read more
Visit website
2.3 billion threats blocked: The state of the threat landscape Q1 2022
Allot Blog
by Avi Hein
2y ago
Allot Secure blocked 618% more malicious URLs in the first quarter of 2022 than the previous year. What’s in store for the rest of the year? What did the past few months look like? This is explored in-depth in the recently released Allot Q1 2022 Cyber Threat Report. During the first quarter of the year, Allot Secure blocked malicious URLs 2.3 billion times, protecting subscribers for consumers who subscribe to cybersecurity services based on Allot solutions that are provided by European CSPs. Here are some recent trends: Phishing blocks increased by 37% (47 million in Q1 2021 vs 64 million in ..read more
Visit website
How to protect against the weakest link in cybersecurity – THE USERS
Allot Blog
by Ami Barayev
2y ago
Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are in a constant battle to improve organizational security posture and prevent risks across all potential attack surfaces. Web threats are, by far, the dominant attack vector for which Secure Web Gateways (SWGs) and NG Firewalls utilize URL/content filtering, advanced threat defense, and malware protection to defend users from internet-borne threats, as well as help enterpris ..read more
Visit website

Follow Allot Blog on FeedSpot

Continue with Google
Continue with Apple
OR