Blog & Industry News
RedWolf works with your organization’s team globally to elevate skills, increase understanding of their cyber defenses that improves their cyber defense capability over time. Keep up to date with their innovative defense platform news on the blog.
blog / Latest Articles
In the ever-evolving landscape of cybersecurity, new vulnerabilities and attack vectors are discovered almost daily. One such recent discovery…
Middlebox TCP-reflected amplified attacks are a new DDoS attack vector, first disclosed…
RedWolf has been listed on the AWS website as a trusted DDoS…
Sharjil Khan, Principal Consultant at Redwolf Security Inc will be giving a…
Many customers have requested that RedWolf add web site crawler capability to the platform. Crawlers are used to enumerate pages on web sites and scrape information. Crawlers are designed to exhibit realistic usage patterns to avoid detection by WAF’s and DDoS devices. RedWolf is pleased to announce the new capability of automated Web Site Crawling scenarios […]
Everyone knows it is difficult to get an environment ready for test. RedWolf’s Test Target VM’s are pre-configured test servers that can function as a ‘victim’ or ‘target’ of an attack and send real-time telemetry to your RedWolf control system. This lets you see both the ‘attacker’ and the ‘victim’ statistics side-by-side. The main benefits […]
Q: How is self-serve training delivered? A: Training is required (always included) for the self-serve portal. It needs to be refreshed every 6 months. Q: What is the portal URL? A: https://auth.redwolfsecurity.com The portal supports multi-factor authentication and can even be limited to logins from a single IP. So authentication is safe. […]
Q: How long does it take to schedule a test? ALWAYS AVAILABLE 24/7: Self Serve Tests SCHEDULING REDWOLF MANAGED TESTS: Immediately if resources available. Normal is two weeks. If test design / recon / etc… is necessary two to three weeks is recommended. Try to get on a calendar as soon as possible. Weekends are […]
Q: Can a Virtual Machine be provided to be used as a target for the testing? YES. RedWolf offers a downloadable VMware virtual machine ‘agent’ that can be used in local networks (typically labs) to generate traffic. Even though these agents are local they are still controlled from the same ‘control.redwolfsecurity.com’ portal. The amount […]
Q: What are the benefits of DDoS testing? • Demonstrable capability • Improve Operational Performance • Optimize configuration • Extract full value of infrastructure and services • Manage 3rd party risk • Confirm technical controls • Confirm SLA’s • Keep up to date with emerging threats Q: How can DDoS testing be done safely? RedWolf […]
Senators introduced a bill last week to establish a bug bounty pilot program within the Department of Homeland Security.
More than 1,000 mobile apps are leaking personal information via unsecured backend platforms such as MongoDB, MySQL and others.
A high-severity vulnerability in sudo has been patched in a number of Linux distributions; the flaw allows local attackers to elevate privileges to root.
Google announced today new security features in Gmail, including the news that it will enhance early phishing detection in Gmail through dedicated machine learning.
Developers behind FreeRADIUS, an open source implementation of the networking protocol RADIUS, are encouraging users to update to address an authentication bypass found in the server.
A crowdfunding effort to buy a subscription to the ShadowBrokers’ Monthly Dump Service of stolen exploits and data was shut down citing legal and ethical concerns.
A breach at OneLogin appears to have compromised customer data, including the ability to decrypt encrypted data.
Researchers at Kaspersky Lab have found a number of programming errors in the WannaCry ransomware code that put file recovery within reach of sysadmins.
The ShadowBrokers announced details on how to subscribe to its Monthly Dump Service, which is available for 100 Zcash.
Pacemakers and pacemaker programmers lack authentication and are plagued with thousands of software vulnerabilities across leading manufacturers.
Microsoft quietly patched a critical vulnerability found by Google’s Project Zero team in the Malware Protection Engine.
Mike Mimoso and Chris Brook recap the news of the week, including the EternalRocks worm, the latest on WannaCry, a subtitle hack, and a Twitter flaw.
Phishing sites are deploying freely available TLS certificates in order to dupe victims into thinking they’re visiting a safe site.
A recently released extension for Chrome, developed by the public key crypto database Keybase, brought end-to-end encrypted messaging to several apps this week.
Rep. Tom Graves has revised a draft of the Active Cyber Defense Certainty Act with new provisions that include mandatory notification and permission to recovery or destroy stolen data on the attacker’s computer.
A linguistics analysis of the 28 ransom notes included with WannaCry indicate that native Chinese and English speakers wrote the original note, Flashpoint said.
The Samba Team has patched a severe bug that leaves computers vulnerable to wormable exploit.
The market for automated credential stuffing tools is growing fast, because of a record number of breaches.
Telling your COO or CEO that you need to test your cyber security against a distributed denial-of-service (DDoS) attack is easy enough—today’s smart executives know the importance of cyber security and uptime, and they know a DDoS attack can severely damage a company’s reputation and relationship with its customers. But when your executives in turn […]
Do you know how critical DNS is? You won’t be hard-pressed to find a recent cyberattack that impacted a company’s operations. Of course, last year’s DDoS attack on Dyn DNS immediately comes to mind, but there are countless more cyberattacks that disrupt businesses and have the potential to cost your company hundreds of thousands of […]
RedWolf is pleased to announce new data center support for Upcloud. RedWolf agents can now be located in any Upcloud data center, with traffic levels up to 5 Gigabit/sec per data center. RedWolf support for IPV4 and IPV6 DDoS agent availability in the following Upcloud data centers: – Helsinki, Finland – London, England – Frankfurt, […]
Botnet sizes vary considerably. If you want to simulate a realistic DDoS attack and ensure your protected how many attackers should you have?
Would it surprise you to learn that the most enduring and toughest to fix DDoS vulnerabilities RedWolf testing exposes occur at very low bandwidth levels between 1 and 10 megabit/sec? For years RedWolf has confirmed that it is possible for a botnet of as few as 10 to generate a specific set of packets that […]
When doing DDoS testing it is important to generate traffic from a many diverse sources as possible. RedWolf Security has the capability to generate global traffic to over 100 data centers in 36 different regions. As of November 2016, all 36 data centers also support IPV6. No other provider of DDoS testing / simulation services […]
RedWolf is pleased to announce general availability of IoT / Mirai / Black Nurse DDoS cloud testing / simulation capability. These recent DDoS attacks have changed the playing field within a short time (Q4 2016) by creating new attack vectors, million-strong botnets, and the largest (>600 Gigabit/sec) DDoS attacks. How RedWolf has simulated the […]
RedWolf customers are familiar with the XLS template used to help plan DDoS tests. The latest changes to the XLS template include: project-tracking milestones — The RedWolf process keeps getting better! The XLS now includes a very refined and minimal project plan, making it easy to manage by RedWolf and internal project teams. The plan […]
Recently a botnet called Mirai has infected millions of IoT (Internet-of-Things) devices and generated the largest DDoS attacks ever seen — over 660 Gigabit/sec! Prior to these attacks RedWolf had the largest (legal) DDoS attack test on record, clocking in at 440 Gigabit/sec. Today’s RedWolf global traffic generation capacity is over 1 Terabit/sec from over […]
RedWolf is pleased to announce traffic sourcing in Ohio. RedWolf can now deliver over 400 Gigabit/sec of traffic sourced within North America. RedWolf now certifies legal DDoS generation from 17 North American data centers in USA, Canada and Mexico. The global count of regions is now 45 and actual number of data centers is over […]
RedWolf is pleased to announce full support of traffic sourcing from Mumbai, India. This compliments our existing support for Chennai India. Currently only IPv4 is supported through Mumbai. Chennai supports IPv6 traffic generation. Asia/Pacific traffic generation now includes mainland China (Beijing), Hong Kong, Taiwan, India, Singapore, Japan and Korea. RedWolf can now deliver over 400 […]
RedWolf is proud to announce validated support for local traffic generation in South Korea. RedWolf’s validation process ensures simulated DDoS and other cyber-attacks can be legally performed in the region with full support and knowledge of the cloud providers. Since 2006 RedWolf has worked closely with all major cloud provider legal teams, paving the way […]
Enterprise DNS is rarely simple but there is one truth: a DDoS on a vulnerable DNS can cause the most catastrophic outages. A DNS DDoS can easily generate millions of requests per second. Enterprise DNS deployments are often a mix of beefy DNS servers, load balancers performing DNS caching, DDoS mitigation appliances, 3rd party DNS […]
What different kinds of DDoS attacks are there ? Here are some common forms of DDoS attacks (both past and present): UDP Flood User Datagram Protocol is a sessionless networking protocol. One common DDoS attack method is referred to as a UDP flood. Random ports on the target machine are flooded with packets that cause […]
Join RedWolf at Toronto’s SecTor security conference! Now entering its 9th year, SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences. This year’s event is held at the Metro Toronto Convention Centre
RedWolf has found that most organizations work to protect popular DDoS targets like web sites and DNS servers but often overlook their VPN services. The business impact on a VPN service can be equal or greater than an impact to a web site. To this end RedWolf has invested in improving the platform’s ability to […]