Allot Blog
Be the first to know about the latest updates and trends in network security and IoT. Sign up and get updates delivered directly to your inbox.

Tips to squash smishing (SMS phishing)
Avi Hein | | Allot Secure, Mobile Security, Network Security, networksecure, Phishing, Security as a Service, smishing, SMS
No matter how robust the network security infrastructure is, an error in judgment can open the floodgates for cyberattacks. Deceiving a user into revealing sensitive information, primarily over email, is called phishing ...

Log4Shell is the worst security issue of the decade: what you should do
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with ...

What is mobile security?
The use of smartphones has surged, but the users’ knowledge regarding the security of mobile devices has not kept pace with this uptick. To put things into perspective, a study claimed almost ...

CSPs reveal what’s really happening with 5G
Michael Schachter | | 5G, actionable intelligence, Cloud, Communication Service Provider, Connected Cars, Content Delivery, csp, CSPs, Cybersecurity, Internet of things, Mobile, Mobile Security, Network Security, Network Virtualization, Network Visibility & Control, QoE, Quality of Experience, Service Providers, telcom, Telecom, Traffic Management
Over the years, the team here at Allot has amassed quite a library of Telco Trends Reports, which we publish as important developments occur within the industry. Our latest report dives in ...

Understanding user intent – the panacea for mission-critical application QoE issues
Ami Barayev | | Allot Secure, cyber attacks, cyber defense, Cyber Security, Cyber-attack, Cybersecurity, cyberthreats, ddos, DDoS Security, enterprise, Network Security, Network Visibility & Control, QoE, Quality of Experience, security
In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...

What is ZuoRAT?
ZuoRAT is a remote access trojan (RAT) that attacks small office/home office (SOHO) routers. On June 29, 2022, Black Lotus Labs, the threat intelligence arm of Lumen Technologies, revealed the existence of ...

A look back at Infosecurity 2022
Whew, I just returned from London after having attended Infosecurity, Europe’s largest cybersecurity conference. While my legs are tired from so much walking due to the rail strike – the largest in ...

Do we really need 5G?
Yaakov Stein | | 5G, Communication Service Provider, csp, CSPs, Mobile, Service Providers, telcom, Telecom
As I mentioned in a previous blog post, 4G is really pretty good. It makes quite a few useful things possible: fast general Internet access (on the order of DSL) download and ...

2.3 billion threats blocked: The state of the threat landscape Q1 2022
Avi Hein | | Allot Secure, CTR, Cyber Security, Cyber Threat Report, Cybersecurity, cyberthreats, Network Security, Podcast, Security as a Service
Allot Secure blocked 618% more malicious URLs in the first quarter of 2022 than the previous year. What’s in store for the rest of the year? What did the past few months ...

How to protect against the weakest link in cybersecurity – THE USERS
Ami Barayev | | Allot Secure, cyber attacks, cyber defense, Cyber Security, Cyber-attack, Cybersecurity, cyberthreats, ddos, DDoS Security, enterprise, Network Security, security
Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...