Tag Archives: spotlight

China is the top target for DDoS reflection attacks

China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of the 21,845 attack events …

More here:
China is the top target for DDoS reflection attacks

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the company's clients with HTTP flood…

Read the original:
CCTV botnets proliferate due to unchanged default factory credentials

UK, US law enforcement agencies disrupt Dridex botnet

The UK's National Crime Agency is spearheading an onslaught against the Dridex (aka Bugat, aka Cridex) banking malware and the criminals that wield it. “Dridex malware, also known as Bugat and Crid…

More:
UK, US law enforcement agencies disrupt Dridex botnet

Unexpectedly benevolent malware improves security of routers, IoT devices

At this point in time, the existence of a botnet comprising of tens of thousands of compromised routers and other IoT devices is not news. Nevertheless, this latest one mapped by researchers is a spec…

Read this article:
Unexpectedly benevolent malware improves security of routers, IoT devices

7 key global DDoS trends revealed

Neustar released the findings of its latest DDoS report, including key trends. The global research reveals more activity around targeted, smaller assaults aimed at distracting firms’ IT departments wh…

View the original here:
7 key global DDoS trends revealed

UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service redirects the client to t…

Read the original post:
UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

How to sabotage DDoS-for-hire services?

We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them. What is less known is that a simple move like making PayPal seize the accounts through whic…

View the original here:
How to sabotage DDoS-for-hire services?

Revisiting takedown wins: Are users in the developing world getting left behind?

We have all seen the headlines: another botnet dismantled, and we can all rest easy that the threat that has been plaguing us for all those years is now no longer an issue. After the headlines, howeve…

See the original article here:
Revisiting takedown wins: Are users in the developing world getting left behind?

Cloud security: Integrated global CDN with DDoS mitigation and WAF

Applications are becoming more accessible on the web across all industries including gaming, e-commerce, software, and media. This is great for reaching new customers around the globe, but along with …

Read More:
Cloud security: Integrated global CDN with DDoS mitigation and WAF

Another malware building toolkit leaked, botnets already popping up

Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its configuration code in a JPG file i…

Read More:
Another malware building toolkit leaked, botnets already popping up