Escolha uma Página

Today, botnet requires more than just static signature based security protection. The modern botnet is essentially a collection of proxies and hosts that are the battleground for attackers and their malicious objectives.

The compromised systems are called “bots” and tied to a command and control (C&C) server. The C&C server is used by attackers to send out instructions for the bots to execute. Once controlling the C&C server, attackers can wreak havoc of intranet by ultimately stealing data or running ransomware.

Botnet creates havoc in network and business at hand, including:

  • Business extortion
  • Enterprise resource consumption
  • Data theft
  • Malicious program execution

Hillstone, by adding layers of protection to your network, now offers botnet C&C prevention solution in the latest release of its Operating System (StoneOS), which including:

  • Effectively discover intranet bots and prevent further attacks of advanced threats through comparison of information obtained with the C&C address database
  • Regularly update the botnet server addresses
  • Add prevention methods for C&C IP and domain addresses
  • Support TCP, HTTP, and DNS traffic detection
  • Add IP and domain whitelists

Note that this solution is available in the Base Version 5.5R5F2.

Vulnerability Notification: Microsoft Windows Shell Zip File Remote Code Execution

Vulnerability Notification: Cisco Adaptive Security Appliance Webvpn XML Parser Double Free

Announcing Enhancements to Hillstone Networks CloudView

Announcing the Hillstone Server Breach Detection System 2.1

Vulnerability Notification: Adobe ColdFusion Deserialization

Vulnerability Notification: Oracle WebLogic Server XmlAdapter Deserialization

Statement on Vulnerability: Hillstone Networks does not use Intel Processors in its NGFW

Hillstone Responds to Bad Rabbit Ransomware

Protections of NEW Variant of Petya Ransomware Using Hillstone Network’s Layered Security Solution

Hillstone Networks

Hillstone Networks