Hi [[ session.user.profile.firstName ]]

Hacker’s Toolkit: DDoS for Hire

It’s no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis. But what is the nature of these botnets? What abilities do each of the installed toolkits offer to the attacker? Most importantly how do their capabilities change the defenses necessary to protect yourself?

We’ll cover two of the most recent toolkits that have been seeing wide usage. Learn a little about the people behind the attacks, where the attacks are coming from and what you might expect to see in the near future. You might be a bit surprised at where a lot of the traffic is coming from (hint: it’s closer than you think).
Recorded Dec 1 2015 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Martin McKeay, Senior Security Advocate, Akamai
Presentation preview: Hacker’s Toolkit:  DDoS for Hire

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Using Data Analytics to Predict Malicious Intent Recorded: Feb 17 2016 49 mins
    Alistair Tooth, Director, Akamai
    Adoption of data-driven security is set to rise threefold in 2016. Benefits include advanced security automation, accuracy and intelligence that enable mitigation capabilities to adapt in real time as threats change. However, solutions will only be as effective as the age, quality and quantity of the data available, meaning access to vast amounts of live attack traffic will be vital. Join us for this webinar to learn more about data-driven security and how it’s being deployed to bolster web defences.
  • DD4BC and the Rise of Extortion Recorded: Feb 1 2016 34 mins
    Mike Kun, Manager, Akamai Customer Security Incident Response Team
    DD4BC has targeted many businesses, threatening an attack and demanding Bitcoin payments. Learn about their tactics and techniques, and why Akamai believes that other copycat groups are on the horizon.
  • Hacker’s Toolkit: DDoS for Hire Recorded: Dec 1 2015 48 mins
    Martin McKeay, Senior Security Advocate, Akamai
    It’s no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis. But what is the nature of these botnets? What abilities do each of the installed toolkits offer to the attacker? Most importantly how do their capabilities change the defenses necessary to protect yourself?

    We’ll cover two of the most recent toolkits that have been seeing wide usage. Learn a little about the people behind the attacks, where the attacks are coming from and what you might expect to see in the near future. You might be a bit surprised at where a lot of the traffic is coming from (hint: it’s closer than you think).
  • The Known and Unknown Costs of DDoS Recorded: Nov 4 2015 32 mins
    Martin McKeay, Senior Security Advocate, Akamai in Europe
    Criminals are increasingly turning to cyber-crime as their method of choice, thanks to the increased accessibility provided by numerous automated attack tools and ‘for hire’ subscription services. The number of Distributed Denial of Service (DDoS) attacks against organisation’s websites, for example, are increasing rapidly and the true business costs are often unknown. In addition to the more obvious impacts associated with the lost web transactions associated with downtime, there are also reputational and other ephemeral costs that are harder to quantify.

    We’ll be examining both the monetary and reputational costs of an attack on your infrastructure, as well some of the measures you can take to combat these attacks. With data drawn from Akamai’s State of the Internet Report, we’ll be talking about real world examples of attacks and how these could affect your business.
  • DDoS: Aged Protocols are Fuelling Attacks Recorded: Sep 15 2015 36 mins
    Martin McKeay, Security Advocate, Akamai Technologies
    They say old protocols never die. Okay, no one really says that, but it’s what happens in reality. If you look around a little, you can still find organisations with token ring networks while dial-up modems still account for a small, but significant part of Internet usage worldwide. And then there are the current protocols that simply never get updated. DNS and NTP are staples of the Internet that are absolutely necessary.

    Martin McKeay, Akamai’s Security Advocate for EMEA, will explore the dangers of some of the outdated and unpatched protocols on the Internet today. These antiquated communication methods are being used and abused by malicious actors to send traffic and attacks against your network. Explore how to protect yourself, and learn good network hygiene practices to make sure your organisation is not part of the problem.
  • HTTP/2 Uncovered: Top Tips for Successful Implementation Recorded: Aug 26 2015 52 mins
    Michael Gooding, Web Performance Evangelist, Akamai; Richard Still, Technical Architect, Financial Times
    This webinar gives practical advice for supporting HTTP/2 implementation and shares the experiences of the Financial Times, who have already been through the process.
Making the Internet Fast, Reliable and Secure
As the global leader in Content Delivery Network (CDN) services, Akamai makes the Internet fast, reliable and secure for its customers. The company's advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionising how businesses optimise consumer, enterprise and entertainment experiences for any device, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hacker’s Toolkit: DDoS for Hire
  • Live at: Dec 1 2015 1:00 pm
  • Presented by: Martin McKeay, Senior Security Advocate, Akamai
  • From:
Your email has been sent.
or close