NXNSAttack: New DNS Vulnerability Allows Big DDoS Attacks
Several major providers of DNS services and software have been working to address a serious DNS vulnerability that could allow malicious actors to launch significant distributed denial-of-service (DDoS) attacks. read more more…Layer 7 DDOS – Blocking HTTP Flood Attacks
There are many types of Distributed Denial of Service (DDOS) attacks that can affect and bring down a website, and they vary in complexity and size. The most well known attacks are the good old syn-flood, followed by the Layer 3/4 UDP and DNS amplification attacks. Today though, we’re going to spend a little time […] more…DDoS attacks in Q2 2020
News overview Not just one but two new DDoS amplification methods were discovered last quarter. In mid-May, Israeli researchers reported a new DNS server vulnerability that lurks in the DNS delegation process. The vulnerability exploitation scheme was dubbed “NXNSAttack”. The hacker sends to a legitimate recursive DNS server a request to several subdomains within the […] more…DDoS Attacks in Q4 2018
News overview In Q4 2018, security researchers detected a number of new botnets, which included not only Mirai clones for a change. The fall saw increased activity on the part of the Chalubo bot, whose first attacks were registered in late August. Although the new malware employs snippets of Mirai code and the same persistence […] more…DDOS attacks in Q1 2017
News Overview Thanks to IoT botnets, DDoS attacks have finally turned from something of a novelty into an everyday occurrence. According to the A10 Networks survey, this year the ‘DDoS of Things’ (DoT) has reached critical mass – in each attack, hundreds of thousands of devices connected to the Internet are being leveraged. The fight […] more…DDoS-attack takes Dutch government sites offline for 10 hours
A sophisticated distributed denial-of-service (DDoS) blocked Dutch government and privately run commercial sites from the public for more than 10 hours Tuesday. The ministry of General Affairs, the National Cyber Security Center (NCSC), website hosting company Prolocation and services provider Centric are working to determine the specific methods used in the attack and who was […] more…More information
- Sexism makes hacker conferences a nightmare
- Children should be at least 13 years old to use Internet
- British Hackers Target Falklands Computer Game
- Hackers launch Apple ID phishing campaign playing on iCloud security worries
- EBay develops ‘miles per gallon’ metric for data centers
- Microsoft Windows Kernel CSRSS CVE-2015-2453 Local Privilege Escalation Vulnerability
- Choosing the Right Threat Intelligence Mix
- Carbon Black Acquires Next-Gen AV Firm Confer
- Microsoft SQL Server Management Studio CVE-2018-8527 Information Disclosure Vulnerability
- Patch Tuesday wrap-up, March 2014 – critical from Microsoft, important from Adobe