Archive for the ‘DDoS’ Category

‘Pulse wave’ DDoS – another way of blasting sites offline

August 18th, 2017

If there’s one thing we’ve learned, it’s that any new way of DDoSing will reveal that there are a huge number of undefended devices online

Posted in DDoS, DDoS-for-hire, Security threats, Vulnerability | Comments (0)

News in brief: WannaCry ‘kill switch’ man detained; Firefox file encryption; DDoS fails to persuade

August 3rd, 2017

Your daily round-up of some of the other stories in the news!

Posted in DDoS, Firefox, news in brief, WannaCry | Comments (0)

DDoS Attacks Can Cost Businesses Up to $2.5M Per Attack, Report Says

May 2nd, 2017

Neustar’s annual DDoS attack report says businesses can lose $2.5M on average detecting and mitigating DDoS attacks.

Posted in cost of DDoS attacks, DDoS, ddos attack, Distributed Denial of Service attacks, IoT, mirai, NeuStar, vulnerabilities | Comments (0)

Malware Hunter — Shodan’s new tool to find Malware C&C Servers

May 2nd, 2017

Rapidly growing, insecure internet-connected devices are becoming albatross around the necks of individuals and organizations with malware authors routinely hacking them to form botnets that can be further used as weapons in DDoS and other cyber attacks.

But now finding malicious servers, hosted by attackers, that control botnet of infected machines gets a bit easier. Thanks to Shodan and

Posted in Botnet, botnet detection, Cyber Attacks, DDoS, IoT Search Engine, Malware Hunter, Search engine, Shodan, Shodan search engine | Comments (0)

Discovery of 8,800 servers sends warning to Asian cybercriminals

April 27th, 2017

Move shows the importance of international co-operation to take down cybercrime at its roots

Posted in Botnet, DDoS, interpol, Law & order, ransomware | Comments (0)

Protestors urged to try and swamp White House website

January 20th, 2017

As the inauguration of Donald Trump gets under way in Washington DC, one activist is calling for a DIY DDoS-style attack – which may not be legal

Posted in DDoS, hacktivism, Law & order, LOIC | Comments (0)

Law Enforcement Targets Users of DDoS-For-Hire Services

December 14th, 2016

Law enforcement from more than a dozen countries last week carried out a series of operations designed to crack down on DDoS-for-hire services.

Posted in booters, DDoS, DDoS stressers, Distributed Denial of Service attacks, Europol, Government, National Crime Agency, nca | Comments (0)

BlackNurse revisited: what you need to know

November 17th, 2016

We’ve had a steady stream of questions about “BlackNurse”, so we thought we’d answer them all in one place. Here you are.

Posted in BlackNurse, DDoS, Denial of Service, DOS, firewall, ICMP | Comments (0)

Mirai Internet of Things Botnet Linked to Internet Outage | Flashpoint

October 22nd, 2016

In-brief: A denial of service attack on the managed DNS firm DYN was due, in part, to attacks from Internet of Things devices running the Mirai malware, the firm Flashpoint reported. Analysis by the firm Flashpoint suggests that large-scale denial of service attacks against the managed DNS provider DYN on Friday were carried out, in part, by cameras, digital video recorders and other “Internet of Things” endpoints infected with the Mirai malware. In a blog post, Flashpoint said its analysis confirmed that some of the malicious infrastructure responsible for the distributed denial-of-service (DDoS) attacks were running the Mirai malware. From the blog post: Flashpoint has confirmed that at least some of the devices used in the Dyn DNS attacks are DVRs, further matching the technical indicators and tactics, techniques, and procedures (TTPs) associated with previous known Mirai botnet attacks. However, unlike the botnets used to launch attacks against the website of […]

Definitive Guide to DLP

Posted in Botnet, DDoS, Flashpoint, mirai, Top Stories | Comments (0)

Is your router taking part in DDoS attacks right under your nose?

October 14th, 2016

Akamai calls this one “SSHowDowN”, which is shorthand for “DON’T SET DEFAULT PASSWORDS BECAUSE EVERYBODY KNOWS WHAT THEY ARE.”

Posted in #CyberAware, DDoS, Denial of Service, IoT, NCSAM, router, ssh, Vulnerability | Comments (0)