Author Archives: Enurrendy

DNSFilter introduces new capability to filter generative AI

DNSFilter announced the expansion of its protective DNS software with a new Generative AI category. DNSFilter’s defense provides organizations of all sizes the ability to secure their network against harmful threats such as malware, botnet, and phishing in order to reduce corporate risk. Enterprise security teams who manage and secure tech infrastructure need to address PII protection, and GenAI tools have introduced a new threat to that guarded corporate information. As Generative AI rapidly gains … More ? The post DNSFilter introduces new capability to filter generative AI appeared first on Help Net Security .

See the original article here:
DNSFilter introduces new capability to filter generative AI

Leader of pro-Russia DDoS crew Killnet ‘unmasked’ by Russian state media

Also: NXP China attack, Australia can’t deliver on ransom payment ban (yet), and Justin Sun’s very bad month Infosec in Brief   Cybercriminals working out of Russia go to great lengths to conceal their real identities, and you won’t ever find the state trying to unmask them either – as long as they keep supplying the attacks on Axis nations. It’s the reason why we found it so amusing that of all the ways the identity of an organized cybercrime gang leader could be revealed, it was Russian state media that may have recently outed someone of note.…

View post:
Leader of pro-Russia DDoS crew Killnet ‘unmasked’ by Russian state media

Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet

Akamai sounds the alarm – won’t name the vendors yet, but there is a fix coming Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army for distributed denial of service (DDoS) attacks.…

Read More:
Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet

Mirai malware infects routers and cameras for new botnet

Akamai sounds the alarm – won’t name the manufacturers yet Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army for distributed denial of service (DDoS) attacks.…

Read More:
Mirai malware infects routers and cameras for new botnet

Russian national pleads guilty to building now-dismantled IPStorm proxy botnet

23K nodes earned operator more than $500K – and now perhaps jail time The FBI says it has dismantled another botnet after collaring its operator, who admitted hijacking tens of thousands of machines around the world to create his network of obedient nodes.…

Continue Reading:
Russian national pleads guilty to building now-dismantled IPStorm proxy botnet

NETSCOUT releases Adaptive DDoS Protection for AED

NETSCOUT launched Adaptive DDoS Protection for Arbor Edge Defense (AED) to protect ISPs and enterprises from DNS water torture attacks. According to the NETSCOUT DDoS Threat Intelligence Report, Domain Name System (DNS) water torture attacks increased 353% in the first six months of 2023, overwhelming Authoritative DNS server resources and bringing down critical DNS services. DNS water torture DDoS attacks have been around since 1997, yet many organizations still struggle to efficiently identify and mitigate … More ? The post NETSCOUT releases Adaptive DDoS Protection for AED appeared first on Help Net Security .

More:
NETSCOUT releases Adaptive DDoS Protection for AED

Mozi botnet murder mystery: China or criminal operators behind the kill switch?

Middle Kingdom or self-immolation – there are a couple of theories The Mozi botnet has all but disappeared according to security folks who first noticed the prolific network’s slowdown and then uncovered a kill switch for the IoT system. But they still have one unanswered question: “Who killed Mozi?”…

Original post:
Mozi botnet murder mystery: China or criminal operators behind the kill switch?

HTTP/2 ‘Rapid Reset’ zero-day exploited in biggest DDoS deluge seen yet

Botnet storm drowned last record with 398 million requests per second A zero-day vulnerability in the HTTP/2 protocol was exploited to launch the largest distributed denial-of-service (DDoS) attack on record, according to Cloudflare.…

See the article here:
HTTP/2 ‘Rapid Reset’ zero-day exploited in biggest DDoS deluge seen yet

Mirai reloads exploit arsenal as botnet embarks on another expansion drive

With 13 new payloads it’s the biggest update to the botnet in months The infamous Mirai botnet was spotted by researchers who say it is spinning up again, this time with an “aggressively updated arsenal of exploits.”…

Read More:
Mirai reloads exploit arsenal as botnet embarks on another expansion drive

Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)

Cloudflare, Google, and Amazon AWS revealed that a zero-day vulnerability in the HTTP/2 protocol has been used to mount massive, high-volume DDoS attacks, which they dubbed HTTP/2 Rapid Reset. Decoding HTTP/2 Rapid Reset (CVE-2023-44487) In late August 2023, Cloudflare discovered a zero-day vulnerability developed by an unknown threat actor. The vulnerability exploits the standard HTTP/2 protocol—a fundamental piece to how the Internet and most websites operate. HTTP/2 is responsible for how browsers interact with a … More ? The post Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487) appeared first on Help Net Security .

More here:
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)