d r. paul judge chief research officer barracuda networks the state of internet security: web...
TRANSCRIPT
![Page 1: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/1.jpg)
Dr. Paul JudgeChief Research OfficerBarracuda Networks
The State of Internet Security: Web Attacks Take Over
![Page 2: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/2.jpg)
![Page 3: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/3.jpg)
Half of The Spam Disappeared
3
1 2 3 4 5 6 7 8 9 10 11 1220000000000
25000000000
30000000000
35000000000
40000000000
45000000000
50000000000
55000000000
52 Billion 26 Billion
2010
![Page 4: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/4.jpg)
5 Innovations That Caused Security Gaps
Habits of Effective Hackers
![Page 5: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/5.jpg)
Five Innovations That Created Security Risks
![Page 6: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/6.jpg)
• One new domain each second• 196 million domain names• 47 million new sites last year
1. Rapid Growth
Source:Verisign
![Page 7: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/7.jpg)
Rich site-to-browser interaction
Browser is the new operating system
Browser is active in the application, not simply a passive display tool
2. Dynamic Web Apps: AJAX
![Page 8: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/8.jpg)
3. User-Generated Content
• Half of Top 100 sites based on UGC
• 500 million users on Facebook
• 100 million accounts on Twitter
• 2.5 billion photos uploaded each month to Facebook
• 30 million new ads per day on Craigslist
![Page 9: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/9.jpg)
• 20% of the workforce works remotely
• 1 in 11 organizations had remote workers infected
• 46% of remote infections come from infected Web sites
4. Remote Employees
![Page 10: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/10.jpg)
Smartphone and tablet computing blur the line between personal and business computing
Companies must reconsider policies for devices that are not owned by the company
5. New Devices
![Page 11: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/11.jpg)
Habits Of Effective Hackers
![Page 12: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/12.jpg)
1. Malicious Javascript
(Four Habits Of Effective Hackers)
![Page 13: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/13.jpg)
• USAToday.com ad network compromised (idatrinity.com)
• Visitors served malicious javascript bundled with ad for Roxio Creator 2009
• Automatically directed users to Rogue AV Web site (antivirusquickscanv1.com) through malicious traffic distribution system (liveavantbrowser2.cn)
Malvertising
![Page 14: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/14.jpg)
Exploited Site (1 of 4)
![Page 15: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/15.jpg)
hxxp://dipsy.pbs.org/parents/ptframe/images/bground-leaderboard.jpg
instead of:
hxxp://www.pbs.org/parents/ptframe/images/bground-leaderboard.jpg
Exploited Site (2 of 4)
![Page 16: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/16.jpg)
Exploited Site (3 of 4)
![Page 17: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/17.jpg)
hxxp://qxfcuc.info/f.cgi?jzo
The above URL serves exploits that target a variety of software vulnerabilities, including those in Acrobat Reader (CVE-2008-2992, CVE-2009-0927, and CVE-2007-5659), AOL Radio AmpX (CVE-2007-6250), AOL SuperBuddy (CVE-2006-5820) and Apple QuickTime (CVE-2007-0015).
The domain qxfcuc.info is part of a malware campaign that includes tens of similar websites hosted off of a handful of common IP addresses. Similar exploit code was served from most of these domains, although a handful (e.g., yyoqny.info) display a message that suggests the criminal behind this campaign is compromising systems to build a botnet he will likely later lease. Translated from Russian, that message tells prospective leasers to "Send a message to ICQ #559156803; stats available under ststst02."
Exploited Site (4 of 4)
![Page 18: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/18.jpg)
Barracuda Labs Technology:Malicious Javascript Detector (MJD)
– Place content in a virtual browser environment – Perform behavioral analysis of javascript to
determine its intentions
Proxy
![Page 19: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/19.jpg)
2. Search Engine Malware
(Four Habits Of Effective Hackers)
![Page 20: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/20.jpg)
Search Volumes
• 88,000,000,000 Per Month On Google Sites
• 24,000,000,000 Per Month On Twitter
• 9,400,000,000 Per Month On Yahoo Sites
• 4,100,000,000 Per Month On Microsoft Sites
Sources: comScore, Twitter
![Page 21: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/21.jpg)
Barracuda Labs Technology:Search Engine Malware Crawler
• Get Popular Search Terms Hourly• Search for Those Terms• Retrieve the Set of Search Results• Retrieve the Web Sites for the results• Analyze the Sites for Malicious Code• Add Malicious Sites to Barracuda
SPYDEF list
![Page 22: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/22.jpg)
Data Set
4 Search Engines(Bing, Google, Twitter, Yahoo)
153 Days
157,154 Popular Topics
36,972,206 Search Results
![Page 23: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/23.jpg)
• 34,627 malware samples found
• 1 in 1000 search results lead to malware
• 1 in 5 search topics lead to malware
Frequency of Search Engine Malware
![Page 24: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/24.jpg)
Total Malware by Search Engine
Google38%
Yahoo30%
Bing24%
Twitter8%
![Page 25: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/25.jpg)
Lebron James
![Page 26: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/26.jpg)
Search Engine Malware (1 of 4)
26
![Page 27: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/27.jpg)
Search Engine Malware (2 of 4)
27
![Page 28: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/28.jpg)
Search Engine Malware (3 of 4)
![Page 29: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/29.jpg)
Search Engine Malware (4 of 4)
![Page 30: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/30.jpg)
Barracuda Labs Technology:Maltrace: Malware Analysis w. Virtualization
• Collect thousands of malware samples daily from honeypot network
• Load samples into Maltrace• Maltrace allows the malware to run on a virtual PC• Maltrace collects the network traffic generated• Maltrace creates signatures based on malicious traffic• Adds the signatures to URL, IP and fingerprint databases
![Page 31: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/31.jpg)
3. Social Attacks
(Four Habits Of Effective Hackers)
![Page 32: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/32.jpg)
Facebook Social Attacks
![Page 33: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/33.jpg)
Photo ‘Tags’ Up To 50 People
![Page 34: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/34.jpg)
Website Selling Fake Illegal Shoes
![Page 35: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/35.jpg)
Automated Social Engineering
![Page 36: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/36.jpg)
Malicious Facebook Apps
![Page 37: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/37.jpg)
![Page 38: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/38.jpg)
Likejacking
![Page 39: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/39.jpg)
![Page 40: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/40.jpg)
![Page 41: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/41.jpg)
![Page 42: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/42.jpg)
![Page 43: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/43.jpg)
![Page 44: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/44.jpg)
Twitter – Trending Topics (Step 1 of 3)
![Page 45: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/45.jpg)
Twitter – Trending Topics (Step 2 of 3)
hxxp://securityland.cn/?uid=144&pid=3&ttl=31c48520c54
which acts as a traffic distribution system for a Rogue AV operation; the chain of redirections ends at one of the following Rogue AV distribution points:
hxxp://my-systemscan.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D hxxp://my-newprotection.net/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D hxxp://trustsystem-protection.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2 qeNm6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D
![Page 46: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/46.jpg)
Twitter – Trending Topics (step 3 of 3)
![Page 47: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/47.jpg)
Barracuda Labs Technology:Twitter Reputation System
• Process Twitter Public Stream• Query Twitter User Database for Other Users• Analyze Users’ Activities• Analyze Web Links• Add Malicious Sites to Barracuda SPYDEF list
![Page 48: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/48.jpg)
Twitter Growth
Red Carpet EraNovember 2008 – April 2009
• 54% of the Top 50 Twitter users joined
• Growth rate increased tenfold from 2% in Nov 08 to 21% in April 09
![Page 49: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/49.jpg)
Twitter Crime Rate
• 2006 = 1.2%• 2007 = 1.7%• 2008 = 2.2%
Red Carpet Era:
During: Increased 66%• 2.0% to 3.4% Crime Rate
Four months later: Increased 350%• 12% Crime Rate in Oct 2009
Twitter Crime Rate: the number of accounts per hundred created during a particular period of time that are suspended
![Page 50: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/50.jpg)
![Page 51: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/51.jpg)
4. Web Exploit Kits
(Four Habits Of Effective Hackers)
![Page 52: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/52.jpg)
Web Exploit Kit Overview
– Most exploits served by exploit kits – (ready-made tools sold/used by criminals to attack
vulnerable software components – Many exploit sites, but few exploit kit types
– a handful of kit types comprise the majority of exploit sites
– Examples • LuckySploit, Fragus, UniquePack, NucPack• Tornado, Fiesta, IcePack, FirePack, MPack
![Page 53: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/53.jpg)
![Page 54: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/54.jpg)
![Page 55: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/55.jpg)
Barracuda Labs Technology:Exploit Kit Detector (EKD)
– Leverage the many-to-few relationship between exploit sites and exploit kit types
• Focus of the handful of kit types that correspond to the majority of exploit sites
– Use information invariant to these kits to detect instances of them in a site-independent fashion
Proxy
![Page 56: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/56.jpg)
Summary
![Page 57: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/57.jpg)
Who Is Behind This?
![Page 58: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/58.jpg)
The Worlds Greatest Spammers:Where are they now?
Alan Ralsky Scott Richter
‘Godfather of Spam’ ‘King of Spam’
70 million emails per day 100 millions email per day
#1 of top spammers list #2 and #9 of top spammers list
$3 Million profit summer 2005 in pump and dump Chinese penny stocks
Over 40,000 ‘Iraq Most Wanted’ card decks sold before printed
2005 FBI raid and investigation 2003 New York Attorney General lawsuit2006 Microsoft lawsuit2008 Myspace lawsuit
![Page 59: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/59.jpg)
The Worlds Greatest Spammers:Where are they now?
Alan Ralsky Scott Richter
‘Godfather of Spam’ ‘King of Spam’
70 million emails per day 100 millions email per day
#1 of top spammers list #2 and #9 of top spammers list
$3 Million profit summer 2005 in pump and dump Chinese penny stocks
Over 40,000 ‘Iraq Most Wanted’ card decks sold before printed
2005 FBI raid and investigation 2003 New York Attorney General lawsuit2006 Microsoft lawsuit2008 Myspace lawsuit
2009: Sentenced to 51 months in Federal prison
![Page 60: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/60.jpg)
The Worlds Greatest Spammers:Where are they now?
Alan Ralsky Scott Richter
‘Godfather of Spam’ ‘King of Spam’
70 million emails per day 100 millions email per day
#1 of top spammers list #2 and #9 of top spammers list
$3 Million profit summer 2005 in pump and dump Chinese penny stocks
Over 40,000 ‘Iraq Most Wanted’ card decks sold before printed
2005 FBI raid and investigation 2003 New York Attorney General lawsuit2006 Microsoft lawsuit2008 Myspace lawsuit
2009: Sentenced to 51 months in Federal prison
2009: Founded “Lunatic Games”-a social gaming company
![Page 61: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/61.jpg)
Barracuda Labs Threat Intelligence
![Page 62: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/62.jpg)
Barracuda Labs Resources• Web Sites and Reports
– www.Barracuda.com– www.BarracudaLabs.com– www.BarracudaCentral.org– www.TweetBrawl.com– www.TweetGrade.com– Barracuda Labs Annual Threat Report
• Contact– Twitter: @Barracuda, @BarracudaLabs– Paul Judge, Chief Research Officer
• [email protected] • Twitter: @PaulJudge
![Page 63: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/63.jpg)
Servers
Barracuda Web Application Firewall
Barracuda Web Application Firewalls
SSL AccelerationPipeliningCachingCompressionLoad Balancing
OWASP protectionVirus scanningData leakageCloakingXML Firewall
Remote Users
Teleworkers
![Page 64: D r. Paul Judge Chief Research Officer Barracuda Networks The State of Internet Security: Web Attacks Take Over](https://reader036.vdocument.in/reader036/viewer/2022062407/56649cc85503460f94990307/html5/thumbnails/64.jpg)
Barracuda Web Security Flex
64
• Cloud-based content filtering and malware protection• On-network appliances when needed for local enforcement• Remote and mobile filtering• Centralized multi-site management and reporting • Unlimited deployment flexibility