Geoff Blaine
June 9, 2018

About Geoff Blaine

A 10-year veteran of the security space, Geoff serves as A10's senior communications writer and content manager. He brings a blend of real-world journalism experience, cybersecurity perspective and mainstream tech interest.

Recent posts by the Author

June 9, 2018

DDoS Attacks on IPv6

IPv6.  We've heard it's been coming for years but no, it's not here yet.  However it's "here" enough to be a security threat to every organization that has started their migration to IPv6.  With IPv6 adoption comes new security challenges.  Although only 25% of websites completely support IPv6 today, many more are supporting v6 in…

March 17, 2017

IoT Devices Are Powering Affordable DDoS-for-Hire Services

For as long as there has been cyber crime, there have been illegal exploit kits for sale. Sure, these vary from the elementary to the advanced, but the malicious tools needed to commit cyber crime, theft, hacktivism or participate in run-of-the-mill online havoc are only a click away. But the raw power, scale and sophistication…

February 23, 2017

Real-Time DDoS Detection and Mitigation: Live A10-Kentik Demo at MWC

There is no surprise. While their motives vary, threat actors and criminal organizations are skillfully leveraging advanced distributed denial-of-service (DDoS) attacks against popular service providers, carriers and mobile operators. DDoS exploit kits are easy, inexpensive and highly effective. “Just like death and taxes, the DDoS threat has reached the level of ‘unavoidable fact’ for the…

February 9, 2017

W-2 Phishing Scams Targeting More than Enterprises, Warns IRS

It happens daily. An employee receives an urgent email from a superior or executive requesting information, files or documents. Most of the time, it’s legitimate business. But a new strand of W-2 phishing emails — sometimes known as business email compromise (BEC) — is using this standard routine to steal corporate payroll data, taxpayer information and…

November 8, 2016

Inside the Mirai Malware That Powers IoT Botnets

In early October 2016, the source code for a specific Internet of Things (IoT) malware was released on a hacking community called “Hackforums.” The malicious item, now known as Mirai malware, was posted by a user named Anna-Senpai, who claimed a botnet was used to prey on hundreds of thousands of IoT devices daily. We…

October 21, 2016

DDoS Attack on Dyn Reveals New Threat Actor Strategies

In the early hours of Oct. 21, many top consumer application services — including Spotify, Reddit, Github and Twitter — experienced partial or total disruption in parts of the U.S. east coast and south central regions. It was the result of yet another massive distributed denial of service (DDoS) attack, but this time against DNS…

September 29, 2016

Are Retailers Using SSL Inspection? Not According to Ponemon

Insights from the Ponemon Institute Survey “Hidden Threats in Encrypted Traffic” We’ve all seen the headlines about the latest cyberattacks that hit popular retailers. If you've shopped at any of the retailers that were targeted, you may have become embroiled in the breach yourself — hackers have compromised the payment records of millions of individuals, resulting…

September 26, 2016

ICYMI: Cloud-Native Strategy for the On-Premise Business [On-Demand Webinar]

: A full recording of this webinar is available on demand. Watch it here. Organizations and humans alike must learn from history, but conversely we must not allow where we’ve been to dictate where we’re going. In relation to technology, this understanding is paramount, especially as we research methods to harmoniously bridge existing on-premise infrastructures to new…

September 14, 2016

Financial Industry not Prepared for Attacks in Encrypted Traffic

Verizon’s 2016 Data Breach Investigations Report found that 89 percent of breaches last year were motivated by greed or espionage. Since motives are increasingly financial, it makes sense that the financial institutions that underpin the world’s economy are increasingly targeted. The Ponemon Institute found, on average, 83 percent of financial companies suffer more than 50…

August 31, 2016

Shadow Brokers: How the NSA Leak Affects Your Business

You’ve been desensitized. Not to unfortunate and unnecessary violence this time, but to security breaches, hacks and damaging data leaks. It’s not your fault. There have been many. But don’t overlook this one. It’s different, and could be the precipice of a new cyber security reality. Here’s why you should pay attention. What is the…