Tag Archives: browse-archive

Larger, more complex, financially motivated DDoS attacks on the rise

DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, the results of Arbor Networks' 11th Annual Worldwide Infrastructu…

See more here:
Larger, more complex, financially motivated DDoS attacks on the rise

Group using DDoS attacks to extort business gets hit by European law enforcement

On 15 and 16 December, law enforcement agencies from Austria, Bosnia and Herzegovina, Germany and the United Kingdom joined forces with Europol in the framework of an operation against the cybercrimin…

More here:
Group using DDoS attacks to extort business gets hit by European law enforcement

Are your competitors organizing DDoS attacks against you?

According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of those behind recent DDoS att…

View article:
Are your competitors organizing DDoS attacks against you?

DDoS attacks increase 180% compared to a year ago

Akamai Technologies announced its Q3 2015 report, which provides analysis and insight into the global cloud security threat landscape. “Akamai has been seeing greater numbers of denial of service a…

Read More:
DDoS attacks increase 180% compared to a year ago

Researchers map out hard-to-kill, multi-layered spam botnet

A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems. The botnet is multi-layered, decentralized, a…

More:
Researchers map out hard-to-kill, multi-layered spam botnet

New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers

Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection. In a reflection DDoS attack, also called a D…

View the original here:
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the company's clients with HTTP flood…

Read the original:
CCTV botnets proliferate due to unchanged default factory credentials

Unexpectedly benevolent malware improves security of routers, IoT devices

At this point in time, the existence of a botnet comprising of tens of thousands of compromised routers and other IoT devices is not news. Nevertheless, this latest one mapped by researchers is a spec…

Read this article:
Unexpectedly benevolent malware improves security of routers, IoT devices

XOR DDoS botnet launching attacks from compromised Linux machines

Attackers have developed a botnet capable of 150+ Gbps DDoS attack campaigns using XOR DDoS, a Trojan malware used to hijack Linux systems, according to Akamai. What is XOR DDoS? XOR DDoS is a T…

Read the article:
XOR DDoS botnet launching attacks from compromised Linux machines

Mobile ad network exploited to launch JavaScript-based DDoS attack

A type of DDoS attack that has until now been mostly theoretical has become reality: CloudFlare engineers have spotted a browser-based Layer 7 flood hitting one of its customers with as many as 275,00…

More here:
Mobile ad network exploited to launch JavaScript-based DDoS attack