When organizing protectio
Posted: Tue Feb 11, 2025 6:40 am
An analysis of attacks on the seventh, application layer of the OSI network model shows that approximately 25% of Internet access devices do not have software that is consistently updated. These devices include not only those that are not updated due to the fault of users, but also those that are no longer supported by manufacturers and continue to be used by users. It should be remembered that unupdated software is a significant source of cyber vulnerabilities.
The application layer plays an important role in conducting so-called targeted (APT) attacks. As Evgeny Gnedin, head of the information security analytics department at Positive Technologies, notes, web applications have become a common channel for primary penetration into corporate infrastructure, primarily websites, without which modern companies cannot function. According to the company, vulnerabilities are found today on every second website. The security of web resources, like other applications most frequently used in organizations, should be given primary attention.
n, it is also necessary to remember that attackers will act through the most vulnerable places, including connections with remote branches and partners, the protection of which is usually weaker than the protection of central resources or is difficult to control.
Current attempts to optimize telecom operators' ghana whatsapp data using the BGP protocol are causing major problems. Thus, in January of this year, individual IP addresses of Google, Apple, Instagram, Facebook, WhatsApp and some other companies were suddenly redirected by a traffic optimization service provider located in the DPR to one of the traffic exchange points in St. Petersburg. Such switches are fraught with not only disruption of the availability of Internet resources, but also malicious interception of traffic. According to Qrator Labs, similar incidents occurred repeatedly in 2019.
It is important to note that in order to reduce traffic costs, Russian telecom operators (and not only them) have begun actively purchasing BGP optimizers, and the technical center of Roskomnadzor is legally allowed to directly manage BGP announcements. According to Qrator Labs experts, this is fraught with an increase in the number of incidents similar to the one mentioned above. For example, quite recently, an entire autonomous system (i.e. a system on the scale of a telecom operator network or a large content provider, in Russia this is the scale of Rostelecom) in North America was lost for Internet access. Experts believe that a couple of years ago, the administrators of this system stopped communicating with the American Registry for Internet Numbers, and the latter's specialists, without taking any measures for clarification, eventually deleted it from their database. Such arbitrariness is also possible in the global table of IP networks.
The application layer plays an important role in conducting so-called targeted (APT) attacks. As Evgeny Gnedin, head of the information security analytics department at Positive Technologies, notes, web applications have become a common channel for primary penetration into corporate infrastructure, primarily websites, without which modern companies cannot function. According to the company, vulnerabilities are found today on every second website. The security of web resources, like other applications most frequently used in organizations, should be given primary attention.
n, it is also necessary to remember that attackers will act through the most vulnerable places, including connections with remote branches and partners, the protection of which is usually weaker than the protection of central resources or is difficult to control.
Current attempts to optimize telecom operators' ghana whatsapp data using the BGP protocol are causing major problems. Thus, in January of this year, individual IP addresses of Google, Apple, Instagram, Facebook, WhatsApp and some other companies were suddenly redirected by a traffic optimization service provider located in the DPR to one of the traffic exchange points in St. Petersburg. Such switches are fraught with not only disruption of the availability of Internet resources, but also malicious interception of traffic. According to Qrator Labs, similar incidents occurred repeatedly in 2019.
It is important to note that in order to reduce traffic costs, Russian telecom operators (and not only them) have begun actively purchasing BGP optimizers, and the technical center of Roskomnadzor is legally allowed to directly manage BGP announcements. According to Qrator Labs experts, this is fraught with an increase in the number of incidents similar to the one mentioned above. For example, quite recently, an entire autonomous system (i.e. a system on the scale of a telecom operator network or a large content provider, in Russia this is the scale of Rostelecom) in North America was lost for Internet access. Experts believe that a couple of years ago, the administrators of this system stopped communicating with the American Registry for Internet Numbers, and the latter's specialists, without taking any measures for clarification, eventually deleted it from their database. Such arbitrariness is also possible in the global table of IP networks.