Syndicated Blog

Allot Blog
Be the first to know about the latest updates and trends in network security and IoT. Sign up and get updates delivered directly to your inbox.
Tips to squash smishing (SMS phishing)

Tips to squash smishing (SMS phishing)

No matter how robust the network security infrastructure is, an error in judgment can open the floodgates for cyberattacks. Deceiving a user into revealing sensitive information, primarily over email, is called phishing ...
Log4Shell is the worst security issue of the decade: what you should do

Log4Shell is the worst security issue of the decade: what you should do

| | Cybersecurity
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with ...
What is mobile security?

What is mobile security?

The use of smartphones has surged, but the users’ knowledge regarding the security of mobile devices has not kept pace with this uptick. To put things into perspective, a study claimed almost ...
CSPs reveal what’s really happening with 5G

CSPs reveal what’s really happening with 5G

Over the years, the team here at Allot has amassed quite a library of Telco Trends Reports, which we publish as important developments occur within the industry. Our latest report dives in ...
Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...
What is ZuoRAT?

What is ZuoRAT?

ZuoRAT is a remote access trojan (RAT) that attacks small office/home office (SOHO) routers. On June 29, 2022, Black Lotus Labs, the threat intelligence arm of Lumen Technologies, revealed the existence of ...
A look back at Infosecurity 2022

A look back at Infosecurity 2022

Whew, I just returned from London after having attended Infosecurity, Europe’s largest cybersecurity conference. While my legs are tired from so much walking due to the rail strike – the largest in ...
Do we really need 5G?

Do we really need 5G?

As I mentioned in a previous blog post, 4G is really pretty good. It makes quite a few useful things possible: fast general Internet access (on the order of DSL) download and ...
Telco CyberTalk Podcast Episode 43 - The State of Consumer Security: Q1 2022

2.3 billion threats blocked: The state of the threat landscape Q1 2022

Allot Secure blocked 618% more malicious URLs in the first quarter of 2022 than the previous year. What’s in store for the rest of the year? What did the past few months ...
How to protect against the weakest link in cybersecurity – THE USERS

How to protect against the weakest link in cybersecurity – THE USERS

Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...
OSZAR »