Introduction Last August, Black Lotus Labs participated in the DEF CON Red Team Village CTF. If that sentence reads as gobbledygook to you, read on as we unpack it. This blog will introduce CTFs and related security concepts, then show […]
Discover top-tier, integrated cybersecurity solutions designed to protect your business. Stay updated on the latest trends in the cybersecurity landscape and learn how advanced threat intelligence and actionable insights can help you swiftly identify and counter today’s most significant cyber threats. Explore our cybersecurity solutions to unlock efficiencies, automate protection, and neutralize threats with transformative security technology and expert consulting.
Introduction Last August, Black Lotus Labs participated in the DEF CON Red Team Village CTF. If that sentence reads as gobbledygook to you, read on as we unpack it. This blog will introduce CTFs and related security concepts, then show […]
By delivering the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences, Lumen plays a critical role in the communications and technology ecosystem that can help protect the cybersecurity of all things. […]
Executive Summary Lumen’s Black Lotus Labs detected a new remote access trojan we’re calling ReverseRat. Based on our global telemetry and analysis, we identified that the actor is targeting government and energy organizations in the South and Central Asia regions […]
Cybersecurity is more important than ever these days, which is why it’s imperative that government agencies’ data be protected by the highest level of government security standards. To ensure that agencies receive the highest level of cybersecurity protections under a […]
The Black Lotus Labs team at Lumen Technologies recently discovered a hacktivist campaign affecting internet-exposed routers and switches that occurred primarily on May 13, 2021. During this campaign, the threat actor abused the victims’ misconfigured Cisco Smart Install protocol, which […]
It would be easy to keep important things secure from prying eyes if you sealed them in a box and chained the box to the bottom of the ocean. The tradeoff, of course, is that you would completely lose the […]
The last year was another active one for the DDoS attack space. The common themes of recent years — increased complexity, frequency and scale — continued to drive the space with actors shifting and adopting tactics, techniques and procedures (TTPs), […]
In recent years, Distributed Denial of Service (DDoS) events have become an ever-present threat, featuring attack traffic pushing to levels measured in terabits per second (Tbps). One of the key tools in the hands of cybercriminals seeking to increase the […]
If there’s one call a CISO never wants to get, it’s the news that operations are shutting down across the company because ransomware has locked access to critical files. While Lumen regularly works with companies to deal with successful ransomware […]
Two decades is an eternity on the internet. When a Canadian teenager launched one of the first distributed denial of service (DDoS) attack to target large corporations at the turn of the century, it was little more than a novelty. […]