DDoS

Linux XOR DDoS Botnet delivers potent DDoS attacksLinux XOR DDoS Botnet delivers potent DDoS attacks

Linux XOR DDoS Botnet delivers potent DDoS attacks

Experts at Akamai discovered the Linux XOR DDoS Botnet,  a malicious infrastructure used to run potent DDoS attacks against dozens…

10 years ago
Mobile Ad Network exploited to run a major DDoS AttackMobile Ad Network exploited to run a major DDoS Attack

Mobile Ad Network exploited to run a major DDoS Attack

Security experts at CloudFlare observed a major DDoS attack against one of their customers that appeared to leverage a mobile…

10 years ago
Cyber criminal crew DD4BC extorts businesses via DDoSCyber criminal crew DD4BC extorts businesses via DDoS

Cyber criminal crew DD4BC extorts businesses via DDoS

According to a report recently issued by Akamai, the DD4BC criminal group has been responsible for at least 114 DDoS…

10 years ago
Tango Down, NCA website offline after Lizard Squad attackTango Down, NCA website offline after Lizard Squad attack

Tango Down, NCA website offline after Lizard Squad attack

Alleged Lizard Squad hackers have DDoSed the website of the British NCA and have downed it after law enforcement arrested…

10 years ago
Teenagers arrested after using the Lizard Squad DDoS toolTeenagers arrested after using the Lizard Squad DDoS tool

Teenagers arrested after using the Lizard Squad DDoS tool

Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad's DDoS tool, the Lizard…

10 years ago
GitHub Again Hit by a new DDoS attackGitHub Again Hit by a new DDoS attack

GitHub Again Hit by a new DDoS attack

GitHubhit by another major DDoS attack to because Chinese developers have been forced by police to remove projects of tools…

10 years ago
Be aware enterprises, it’s time to block Tor networkBe aware enterprises, it’s time to block Tor network

Be aware enterprises, it’s time to block Tor network

A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises…

10 years ago
Exploiting BitTorrent flaws to run Distributed Reflective DDoSExploiting BitTorrent flaws to run Distributed Reflective DDoS

Exploiting BitTorrent flaws to run Distributed Reflective DDoS

Security researchers discovered a new technique to exploit BitTorrent to run powerful DDoS amplification attacks that could bring down great…

10 years ago
Carphone breach, bad actors run DDoS to cover the attackCarphone breach, bad actors run DDoS to cover the attack

Carphone breach, bad actors run DDoS to cover the attack

Carphone Warehouse disclosed a sophisticated attack that may have impacted more than 2.4 million customers. Attackers covered the breach with…

10 years ago
$38 an hour is the cost of destructive DDos Attacks$38 an hour is the cost of destructive DDos Attacks

$38 an hour is the cost of destructive DDos Attacks

DDOS attacks have become cheaper than one can think, just because of the era of DDOS-for-hire services. However, such attacks…

10 years ago