DDoS

Protecting Brazil 2014 World Cup from cyber attacksProtecting Brazil 2014 World Cup from cyber attacks

Protecting Brazil 2014 World Cup from cyber attacks

The Italian security firm Tiger Security issued a report on the current state of cyber attacks against the organization of…

11 years ago
Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate itZeus malware is hard to eradicate, the criminal ecosystem continues to innovate it

Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate it

Prolexic security and engineering response team has issued a study on the possible uses of Zeus malware, remarking that its…

11 years ago
15 million WordPress instances run flawed SEO plugin. Fix it!15 million WordPress instances run flawed SEO plugin. Fix it!

15 million WordPress instances run flawed SEO plugin. Fix it!

Security researchers at Sucuri firm have discovered multiple serious vulnerabilities in the popular ‘All In One SEO Pack’ plugin for…

11 years ago
Orange hacked for the second time in the year, 1,3M records exposedOrange hacked for the second time in the year, 1,3M records exposed

Orange hacked for the second time in the year, 1,3M records exposed

French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website…

11 years ago
Understanding Hit and Run DDoS attacksUnderstanding Hit and Run DDoS attacks

Understanding Hit and Run DDoS attacks

Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited…

11 years ago
Evolution of the Russian underground offerEvolution of the Russian underground offer

Evolution of the Russian underground offer

TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max…

11 years ago
Reading the Verizon Data Breach Investigation Report 2014Reading the Verizon Data Breach Investigation Report 2014

Reading the Verizon Data Breach Investigation Report 2014

Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…

11 years ago
How to abuse Facebook feature to conduct powerful DDoS attackHow to abuse Facebook feature to conduct powerful DDoS attack

How to abuse Facebook feature to conduct powerful DDoS attack

A researcher discovered a flaw in the section "notes" of the social network Facebook that could be exploited by anyone…

11 years ago
Kaspersky on SmartTV malware … it’s question of timeKaspersky on SmartTV malware … it’s question of time

Kaspersky on SmartTV malware … it’s question of time

Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it's a question of time to assist a large-scale…

11 years ago
The Extortion is a common practice in the cyber criminal ecosystemThe Extortion is a common practice in the cyber criminal ecosystem

The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…

11 years ago