Archive for October 10, 2018

OVH Introduces Dedicated Intensive Data Processing Servers

Posted in Commentary with tags on October 10, 2018 by itnerd

OVH today announced its new high-end dedicated servers: the HG 2019 series. Designed to meet the intensive data processing requirements of today’s IT Pro’s focused on big data, high performance computing (HPC), artificial intelligence (AI), deep learning, and virtual desktop infrastructures (VDI), the HG 2019 servers will exceed the expectations of organizations in search of excellence in terms of reliability, manageability and security, while maximizing performance and reducing costs.

Combining best in class components and passing rigorous tests has allowed OVH to ensure the best performance at the best price. With 19 years of experience in designing and optimizing servers, the company is able to standardize and offer at large scale, servers equipped with advanced components such as the Intel Xeon Gold 6154 processor, customizable GPU’s such as Nvidia P100 for parallel processing, and M60 for desktop virtualization, Optane SSD’s, and up to 1.5 TB of RAM.

For maximum reliability, the HG 2019 dedicated servers are built with a redundant architecture at multiple levels, such as electrical circuits or cooling, network connections and power supply. Disks are also hot-swappable, ensuring no downtime and thus allowing unmatched availability for mission critical applications.

This new range of servers takes advantage of OVH’s private network (vRack), which allows direct physical connections between all OVH infrastructures anywhere in the world. With 3 Gbbps bandwidth, the vRack private network is ideal for load balancing and database isolation, all while ensuring the security of machine-to-machine communications within an infrastructure.

The HG 2019 portfolio will also include the exclusive advantages OVH has come to be known for by its customers: 24/7 support, protection against DDoS attacks included at no extra cost, private worldwide optical fibre network of the European cloud leader (15 Tbps throughput). Fully customizable, the servers are already available in OVH data centres located in Roubaix and Gravelines (France) as well as Beauharnois, Quebec (Canada) for OVH users to have a maximum proximity with their customers. Servers will soon be deployed in OVH data centres located in Germany, UK and Poland.


IIS Attacks Increase from 2K to 1.7M over Last Quarter: eSentire

Posted in Commentary with tags on October 10, 2018 by itnerd

IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider, IIS attacks showed a 782x increase, from 2,000 to 1.7 million, since last quarter.

Analysis of the attacks by eSentire Threat Intelligence revealed that both IIS and WebLogic exploits maintained a consistent number of attacks (about 200) per IP across organizations, with those attacks originating from servers hosting Apache, RDP, SQL, IIS, and HTTP API services.

Most sources targeting IIS web servers originated from China-based IP addresses. According to Shodan, there are 3.5 million IIS web servers exposed (with 1 million in China). The compromised servers largely originated from Tencent and Alibaba.

eSentire also noted an interesting collection of operating systems among the attacking infrastructure involved – over 400 of the attacking IPs had Shodan records indicating they were Windows machines (including XP, 7, 8, 2008, and 2012). Additionally, nearly 350 FTP servers and over 100 mail servers were reported; there were also VPN servers, MikroTik devices (reported as bandwidth-testing servers), Kangle, Squid, Jetty, and a handful of lesser-known web service technologies.

Additional Q2 2018 report findings:

  • Top five most affected industries: biotechnology, accounting, real estate, marketing, and construction.
  • The most common execution tactic technique observed around endpoint solutions was the use of PowerShell (32%), followed by VBA scripting (21%). Of the PowerShell-based attacks observed, 83% used obfuscated command lines intended to hide their intentions.
  • Emotet was the most frequently observed malware due to numerous version updates and feature additions since it was first reported in 2014.
  • The use of obfuscated PowerShell commands increased 50% from last quarter, partly due to contributions by Emotet.
  • Four observed exploit campaigns stood out targeting IIS, Drupal, WebLogic servers, and GPON routers. GPON home routers were attacked after the PoC code release (eSentire saw 5K detections total, with volume peaking on May 12). eSentire continues to see home router exploits through Q3.

Report Methodology

The eSentire Threat Intelligence team used data gathered from 2,000+ proprietary network and host-based detection sensors distributed globally across multiple industries. Raw data was normalized and aggregated using automated machine-based processing methods. Processed data was reviewed by a visual data analyst applying quantitative analysis methods. Quantitative intelligence analysis results were further processed by a qualitative intelligence analyst resulting in a written analytical product.

eSentire’s 2018 Q2 Threat Report provides a quarterly snapshot, analyzing all cyber threat events investigated by the eSentire Security Operations Center (SOC), while addressing three key areas: threat types, threat volume, and attack types. Each topic is divided into multiple sections, including visual data analysis, written analytical analysis, practical recommendations, and key assumptions.

To access a complete copy of the report, visit:


HP Reinvents Security With The Wolf: True Alpha Starring Christian Slater

Posted in Commentary with tags on October 10, 2018 by itnerd

Today, HP Inc. released HP Studios short film The Wolf: True Alpha. Now in its third season, The Wolf highlights how corporate networks can be hacked and what companies must do to protect themselves.

The Wolf series is part of HP’s global initiative to elevate awareness of the security risks facing businesses and consumers. Only HP offers printers with built-in malware protections plus industry-leading software and services to deploy the industry’s strongest print security including:

  • Run-time intrusion detection. Detects and stops attacks while the device is running and forces a reboot to repair the system.
  • HP Sure Start. In a reboot, HP Secure Start detects and prevents the execution of malicious code and self-heals the BIOS.
  • HP JetAdvantage Security Manager. HP JetAdvantage Security Manager checks and fixes device security settings in a reboot.

The Wolf: True Alpha is directed by Lance Acord (Lost in Translation, Robot & Frank), and stars Christian Slater (Mr. Robot, King Cobra), Jonathan Banks (Breaking Bad, Better Call Saul), and newcomer Betty Adewole (Wonder Woman).

“Hacking is a serious and growing problem for businesses and consumers. When HP asked me to partner on this series, I thought it was a great opportunity to help educate the public about how to better protect against cyberattacks.” – Christian Slater, award-winning actor.

You can view the short film, “The Wolf: True Alpha” as well as the full web series at

Pulse Secure Offers Abridged Version of Frost & Sullivan 2018 Network Access Control Market Report

Posted in Commentary with tags on October 10, 2018 by itnerd

Pulse Secure today announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top four major NAC leaders in the SMB to Large Enterprise segment by market share and among the top three NAC vendors showing the most significant market share gains.

The recent Frost & Sullivan “2018 Network Access Control (NAC) Market, Global, Forecast to 2022” report states that network visibility is critical. Every device on a network is a potential attack or reconnaissance point that must be discovered and secured, and the increasing level of malware and cyberattacks are driving NAC investments. NAC vendors have been able to add value to licenses by offering added endpoint posture assessment and remediation services, and integration modules. NAC vendors are delivering improved features and functions for visibility, mobility, BYOD, IoT and automated threat response. The result is sustained growth for the NAC market where revenues are expected to grow from 2017 – 2022 at a 16.9 percent CAGR, reaching $2.1B in 2022.

The published report provides an overview of the market including NAC capabilities, technology, drivers, adoption trends and competitive insights.

Pulse Secure offers a portfolio of software-driven Secure Access solutions that satisfy usability, contextual intelligence and policy orchestration to support data center and hybrid IT environments. Sold separately or as part of a Secure Access Suite, Pulse Policy Secure delivers a full-featured NAC solution that is easy to deploy, manage and scale. Highlights of Pulse Secure’s NAC solution within the report include:

  • Markets. BYOD, IoT, interoperability and enforcement drive sales in all geographic regions, with financial services, government, healthcare and manufacturing/high tech among Pulse Secure’s key markets.
  • Product. Pulse Secure NAC provides 360-degree visibility with enforcement to see, monitor and control managed, unknown and IoT devices connecting locally or remotely to the network.
  • Value. Customers can start with Pulse Profiler to discover, assess and inventory network devices. With full network visibility, customers can then use Pulse Policy Secure NAC to invoke access, enforcement and threat response policies, orchestrated via API, Syslog, SNMP and IF-MAP protocols.
  • Value. Pulse Secure’s highly scalable architecture is ideal for large enterprises and MSSPs. Each high-performance appliance can control up to 50,000 users. The solution also includes an embedded, enterprise-class RADIUS server.

The report also cross-references solution attributes compared to other NAC market leaders such as Cisco, ForeScout and HP/Aruba. According to the report findings, “Unlike pure-play NAC offerings, Pulse Secure’s solution can include both VPN and NAC which enables unified visibility, consistent endpoint compliance policy and access control for data center and Hybrid IT. Customers gain a stronger security posture, expedited deployment and lower TCO by leveraging a common client, policy and management framework. Unlike infrastructure NAC, Pulse Secure works with popular switches, wireless, NGFW, EMM, SIEMs and endpoint security for automated threat response. This proven, interoperable architecture simplifies deployment, administration and orchestration.”

For additional insight and to learn more about Pulse Secure’s NAC offering, download a custom version of the “Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022” report.


Urban Armor Gear Announces Two New Cases For The Google Pixel 3 and Pixel 3 XL

Posted in Commentary with tags on October 10, 2018 by itnerd

Urban Armor Gear announced two new styles of protective cases that will suit any Google Pixel 3 and Pixel 3 XL user.

This slideshow requires JavaScript.


UAG’s Monarch and Plyo series allow for uncompromised functionality of Google’s state of the art technology. Using five layers of protection, the Monarch series is crafted with metal alloy and top grain leather to create a featherweight case that meets double the Military Drop Standards for drop and shock (MIL STD 810G-516.6). For a more refined look, UAG’s Plyo series offers a sleeker option to shield your phone. The composite construction combines an impact resistant soft core with air-soft corners. Making it the slim-line option, while still meeting Military Grade protection standards.

Monarch Series – Google Pixel 3 and Pixel 3 XL Case

Available Color’s: Crimson and Black

Price: $59.95

– Handcrafted, featherlight construction with 5 layers of protection
– Top grain leather and alloy metal hardware
– Soft impact-resistant core & honeycomb traction grip
– Oversized tactile buttons & protective screen surround
– Active Edge compatible
– Wireless charging compatible
– 10-Year Limited Warranty
– Meets 2X Military drop-test standards (MIL STD 810G 516.6)

Plyo Series – Google Pixel 3 and Pixel 3 XL Case 

Available Color’s: Glacier and Ice

Price: $39.95
– Armor shell & impact resistant soft core
– Air-soft corners for cushioning impact
– Feather-light composite construction
– Oversized tactile buttons & easy access to touchscreen and ports
– Scratch resistant skid pads and screen surround
– Active Edge compatible
– Wireless charging compatible
– Meets military drop-test standards (MIL STD 810G 516.6)