DDoS

Shielding Applications to Prevent DDoS Attacks

A software-defined perimeter can be an integral tool in protecting against DDoS attacks One common security threat that corporate networks, applications and web-based services have been failing to effectively defend against is ...
Security Boulevard
Man who made $542,925 renting out DDoS services sentenced to prison

Man who made $542,925 renting out DDoS services sentenced to prison

A 21-year-old man who made half a million dollars running DDoS-for-hire services has been sentenced to prison for 13 months. Between August 2015 to November 2017 Sergiy P. Usatyuk of Orland Park, ...
DDoS-for-hire

DDoS-for-Hire Sites Bounce Back

Despite a recent crackdown by the Federal Bureau of Investigation (FBI), there has been a more than 400% increase in the volume of attacks being launched via DDoS-for-hire sites in the last ...
Security Boulevard
DDoS Carpet Bombers

Pulling the Rug Out on DDoS Carpet Bombers

Network attacks driven by traffic, such as DDoS, have long been classified by a capacity threshold or baseline limit. When traffic surpasses that limit, an alarm is triggered to indicate an attack ...
Security Boulevard
DDoS Defense or Devastation

Police Shut Down Largest DDoS-for-Hire Marketplace

A large marketplace that allowed users to rent distributed denial-of-service (DDoS) infrastructure from hackers has been shut down following a global law enforcement operation led by police agencies from the Netherlands and ...
Security Boulevard
Attackers Infect Computers with Cyberespionage Malware via Hacked Routers

Attackers Infect Computers with Cyberespionage Malware via Hacked Routers

Security researchers have discovered a new malware framework that’s used for cyberespionage and is delivered to computers through hacked MikroTik routers. Dubbed Slingshot, the malware has a modular architecture and is on ...
Security Boulevard
Spectre-Inspired Attacks Can Steal Data from Intel SGX Enclaves

Spectre-Inspired Attacks Can Steal Data from Intel SGX Enclaves

Researchers have developed new techniques inspired by the recent Spectre CPU vulnerability to completely compromise the confidentiality of hardware-based secure enclaves created with Intel’s Software Guard eXtensions (SGX). SGX is a feature present ...
Security Boulevard
Systems Vulnerable Authentication Bypass

Some SSO Systems Vulnerable to Authentication Bypass

Some single sign-on (SSO) systems that use SAML are vulnerable to a newly discovered attack that can allow hackers to authenticate as other users without knowing their passwords. SSO systems allow users ...
Security Boulevard
Cisco IoT security

IoT Reaper Botnet Is Much Smaller Than Initially Believed

Security researchers warned last week that attackers are building a massive botnet of more than a million routers and wireless cameras. However, additional research has revealed that the number of devices actually ...