Category Archives: DDoS Criminals

Comcast Business SecurityEdge helps small businesses manage the risk of cyberattacks

Comcast Business announced the launch of its new cloud-based internet security solution, specifically engineered to help small businesses effectively manage the growing risk of cyberattacks. Comcast Business SecurityEdge works to protect a business’ network and the devices connected to it against several existing and emerging Internet-related threats, including malware, ransomware, phishing and botnet infections, without requiring additional hardware or software beyond the Comcast Business Internet modem. In today’s hyper-connected world, cyberthreats are becoming more sophisticated … More ? The post Comcast Business SecurityEdge helps small businesses manage the risk of cyberattacks appeared first on Help Net Security .

See original article:
Comcast Business SecurityEdge helps small businesses manage the risk of cyberattacks

DNSSEC fueling new wave of DNS amplification attacks

DNS amplification attacks swelled in the second quarter of this year, with the amplified attacks spiking more than 1,000% compared with Q2 2018, according to Nexusguard. Researchers attributed Domain Name System Security Extensions (DNSSEC) with fueling the new wave of DNS amplification attacks, which accounted for more than 65% of the attacks last quarter according to the team’s evaluation of thousands of worldwide DDoS attacks. DNSSEC was designed to protect applications from using forged or … More ? The post DNSSEC fueling new wave of DNS amplification attacks appeared first on Help Net Security .

Excerpt from:
DNSSEC fueling new wave of DNS amplification attacks

Time to spin the wheel of pwnage! This week, malware can infect your…. Android set-top box!

IoT botnets move into the home theater market in search of low-hanging fruit Set-top tuner boxes have become the infection vector in the spread of Internet of Things malware.…

Visit site:
Time to spin the wheel of pwnage! This week, malware can infect your…. Android set-top box!

HTTP/2, Brute! Then fall, server. Admin! Ops! The server is dead

Beware the denials of service: Netflix warns of eight networking bugs On Tuesday, Netflix, working in conjunction with Google and CERT/CC, published a security advisory covering a series of vulnerabilities that enable denial of service attacks against servers running HTTP/2 services.…

Read More:
HTTP/2, Brute! Then fall, server. Admin! Ops! The server is dead

Imperva Application Security portfolio provides protection for any attack size

Imperva, the cybersecurity leader championing the fight to secure data and applications wherever they reside, announced significant enhancements to the Imperva Application Security portfolio, now offering targeted protection against account takeover (ATO), an industry-leading approach to detecting and blocking malicious attacks targeted at APIs, as well as partnerships with leading API vendors and an unprecedented three-second SLA for mitigating any type of DDoS attack. These capabilities help customers further harden their defenses against rapidly evolving … More ? The post Imperva Application Security portfolio provides protection for any attack size appeared first on Help Net Security .

View article:
Imperva Application Security portfolio provides protection for any attack size

Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same privileges of their legitimate user, IBM X-Force researcher Grzegorz Wypych warns. Aside from making the device part of a botnet, attackers could carry out sophisticated malicious activity by executing any shell command on the device’s operating system. “An attacker compromising this type of device, and the device being … More ? The post Vulnerable TP-Link Wi-Fi extenders open to attack, patch now! appeared first on Help Net Security .

Taken from:
Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Microsoft wants to improve routing security

The Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society, announced that Microsoft has joined the program whose primary objective is to reduce the most common threats to the Internet’s routing system. Routing security is vital to the future and stability of the Internet. Last year alone, there were 12,600 routing outages or incidents such as route hijacking and leaks that led to large-scale Distributed Denial of Service (DDoS) attacks, stolen … More ? The post Microsoft wants to improve routing security appeared first on Help Net Security .

Excerpt from:
Microsoft wants to improve routing security

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks. The Oracle WebLogic attacks CVE-2019-2725 is a deserialization remote command execution vulnerability that affects all Oracle WebLogic versions that have two specific components enabled. It was publicly revealed on April 21 and Oracle published an out-of-band security fix for it on April 25. … More ? The post Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws appeared first on Help Net Security .

More:
Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

There’s NordVPN odd about this, right? Infosec types concerned over strange app traffic

Firm explains but security folk not appy with clarifications Weird things are afoot with NordVPN’s app and the traffic it generates – Reg readers have spotted it contacting strange domains in the same way compromised machines talk to botnets’ command-and-control servers.…

Read this article:
There’s NordVPN odd about this, right? Infosec types concerned over strange app traffic

The correlation between DDoS attacks and cryptomining

There is a direct correlation between cryptocurrency and DDoS attacks. As the price of cryptocurrency dropped in 2018, leading to decreased profits from cryptomining, hackers on the black market began to divert prime botnet resources to DDoS attack activities, which increased month by month. DDoS attacks in 2018 In NSFOCUS’ 2018 DDoS Attack Landscape report, NSFOCUS analyzed the threat landscape after a landmark year of technological growth related to cloud computing, big data, artificial intelligence … More ? The post The correlation between DDoS attacks and cryptomining appeared first on Help Net Security .

More:
The correlation between DDoS attacks and cryptomining