DoS
HALT! I am Reptar! Intel CPU Bug Panics Cloud Providers
Richi Jennings | | Cloud, Cloud IaaS, cpu, CPU attack, CPU flaw, CPU microcode, cpu vulnerability, Denial of Service, denial-of-service attack, DoS, IaaS, IaaS Security, Infrastructure as a Service (IaaS), Intel, Intel CPU, INTEL-SA-00950, Microcode Flaws, Redundant Prefix Issue, Reptar, SB Blogwatch, x86, x86_64
IaaS Catch Fire: Google and Intel fuzz, find and fix a fabulous bug. Next up: More of the same ...
Security Boulevard
Know the difference, defend against the danger: DoS vs DDoS attacks
In today’s digital age, the threat of cyber attacks is becoming increasingly prevalent, and one of the most common types of attacks is the Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks. These ...
Malicious Life Podcast: The Jester – Hacktivist for Good
Malicious Life Podcast | | Anonymous, Denial of Service, DoS, Hacking, hactivist, Infosec, Patriot Hacker, Podcast, PodcastsCat, QR code, security, th3j35t3r, The Jester, wikileaks, Xerxes
The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that ...
Are Decade-Old DoS Tools Still Relevant in 2021?
Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services. The post Are Decade-Old DoS Tools Still ...
Community detection: CVE-2020-16898
Ben Reardon | | Bad Neighbor, Corelight Labs, CVE-2020-16898, DoS, ESNET, GitHub, ICMP, IPv6, mcafee, Microsoft, pcap, PoC, REC, Remote Code Execution, RFC4443, RFC8106, TCP, Windows, Zeek, ZeekWeek
By Ben Reardon, Corelight Security Researcher This month’s Microsoft Patch Tuesday included a severe Remote Code Execution vulnerability in the way that Windows TCP/IP handles IPv6 “Router Advertisement” ICMP messages. Due to ...
3 Types of Network Attacks to Watch Out For
Tripwire Guest Authors | | Access Attacks, Cyber Security, DoS, network attacks, Reconnaissance attacks, Vulnerability Management
Cybersecurity is becoming more of a common term in today’s industry. It is being passed around executive meetings along with financial information and projected marketing strategies. Within the cybersecurity lexicon, there are ...
What Is the Low Orbit Ion Cannon (LOIC)?
The Low Orbit Ion Cannon (LOIC) is a network stress testing application created by Praetox Technologies. It is used as an attack tool in DoS/DDoS attacks. LOIC is a Windows application that ...
Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT
David Sopas | | AEG Smart Scale, AEG Smart Scale PW 5653 B, BLE, Blog, Bluetooth low energy, bluetooth security, CVSS 3, Denial of Service, DoS, Internet of things, iot, Privacy, security, smart scale, Technical Blog, Vulnerabilities
These days IoT devices are an easy entry point for malicious users to invade users privacy. With that in mind, we tested the AEG Smart Scale PW 5653 BT, specifically the Bluetooth ...
Disaster Recovery: Data Center or Host Infrastructure Reroute
Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had ...
Bank of Spain Reveals Its Website Suffered a DoS Attack
The Bank of Spain revealed that bad actors used a denial-of-service (DoS) attack to temporarily disrupt access to its website. On 27 August, a spokesperson for Spain’s central bank disclosed the attack ...