Tag Archives: browse-archive

Aggressive tactics from DD4BC extortionist group revealed

Akamai shared details of an increase in DDoS attacks from the Bitcoin extortionist group DD4BC, based on observation of attack traffic targeted at customers from September 2014 through August 2015. …

Continued here:
Aggressive tactics from DD4BC extortionist group revealed

UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service redirects the client to t…

Read the original post:
UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

How to sabotage DDoS-for-hire services?

We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them. What is less known is that a simple move like making PayPal seize the accounts through whic…

View the original here:
How to sabotage DDoS-for-hire services?

Revisiting takedown wins: Are users in the developing world getting left behind?

We have all seen the headlines: another botnet dismantled, and we can all rest easy that the threat that has been plaguing us for all those years is now no longer an issue. After the headlines, howeve…

See the original article here:
Revisiting takedown wins: Are users in the developing world getting left behind?

Cloud security: Integrated global CDN with DDoS mitigation and WAF

Applications are becoming more accessible on the web across all industries including gaming, e-commerce, software, and media. This is great for reaching new customers around the globe, but along with …

Read More:
Cloud security: Integrated global CDN with DDoS mitigation and WAF

A comparative view of cloud-based DDoS protection services

Six months ago we experienced a 30Gb/sec and 60M PPS attack that was targeting over 1000 IPs on our network. Although we eventually stopped the attack with the aid of our upstream providers, a number …

Continued here:
A comparative view of cloud-based DDoS protection services

Another malware building toolkit leaked, botnets already popping up

Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its configuration code in a JPG file i…

Read More:
Another malware building toolkit leaked, botnets already popping up

Rise in DDoS reflection attacks using abandoned routing protocol

There's been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai. RIPv1 is a fast, easy way to dynamica…

Original post:
Rise in DDoS reflection attacks using abandoned routing protocol

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network. A surge in DDoS attack activity Q1 2015 set a…

Read the article:
DDoS attacks double, old web application attack vectors still active