Threat intelligence is only useful if you can take action quickly to protect networks, systems and data. It is not a question of receiving intel on attacks, but rather: What data should you use to find indicators of critical security threats?
Today, none of us are immune to the impact of botnets on Internet-connected organizations. There is ample validation that monitoring the communications patterns between command-and-control servers and their intended victims is vital. We believe that taking a proactive approach to tracking botnet behavior can yield threat intelligence that is truly actionable. Botnets that are used for DDoS attacks are on the rise, but so are other types.
This Botnet Research Report examines:
- The potential causes for the increase in these attack types;
- The profile of the victims by industry and geography;
- Commonly-targeted ports and protocols;
- and several other botnet characteristics.