Who organized the attack and why did they target government portals?
Cyprus has successfully repelled a cyberattack on a government portal aimed at blocking access to the state's online services. The incident was part of a series of attacks targeting the country's public and private companies...
Akamai Reveals Another Hole in the UNIX Printing System.
Akamai specialists have identified a new vulnerability in the CUPS (Common Unix Printing System) that can be used for DDoS attacks. To launch an attack, an attacker only needs to send a single packet to a vulnerable CUPS service with...
Despite the decrease in the number of attacks, their power is growing, reaching record levels.
The National Filtering Center in the Netherlands (NaWas), which protects its participants from DDoS attacks, recorded a significant decrease in the number of attacks in the second quarter of this...
The ease of operation of CVE-2023-44487 makes it a high-priority target for cybercriminals.
In August 2023, a critical vulnerability in the HTTP/2 protocol, known as CVE-2023-44487 or Rapid Reset, was identified. This vulnerability, which can cause denial-of-service (DoS) attacks, has become a...
Did your ping jump? Perhaps one of your rivals is a latent cyber villain.
In today's digital world, where online games occupy a significant place in the lives of many people, cybercrime does not stand still. One of the most common types of attacks on game servers is DDoS attacks. These attacks...
The world of information security has enough references to the Wild West. For example, the same division of hackers into Black and White Hat, which came from westerns: villains always wear black hats, and good guys – white.
Continuing this analogy, we can say that DDoS is a revolver that...
Over the past few years, not only the number of DDoS attacks has increased, but also their duration. What is a DDoS attack was learned by representatives of those areas that just a couple of years ago did not know about this phenomenon.
So, we can recall the wave of DDoS attacks at the end of...
В сегодняшнем быстро развивающемся цифровом ландшафте угроза распределенных атак типа "Отказ в обслуживании" (DDoS) становится более серьезной, чем когда-либо. По мере того, как эти киберугрозы становятся все более изощренными, понимание их и противодействие им становится критически важным для...
Were vulnerable businesses unable to replace their devices over such a long period of time?
Recently, cybersecurity experts from the company Fortinet discovered an unprecedented botnet network called Goldoon, which targeted D-Link routers through the vulnerability CVE-2015-2051, which has been...
A year-old vulnerability continues to add to the inventory of cybercriminals.
Informs Fortinet that attackers continue to exploit a year-old vulnerability in TP-Link routers, adding routers to various botnets to conduct DDoS attacks.
The command injection vulnerability CVE-2023-1389 (CVSS...
Anton Nemkin warns about the risks of using anonymous networks.
Internet users who use VPN services may unwittingly become participants in criminal schemes. This was stated by State Duma deputy Anton Nemkin.
According to the MP, scammers actively exploit VPN technologies to involve users in...
What caused the incident and how local specialists managed to restore access.
Cyberattacks of "unprecedented intensity" have been recorded in a number of French government organizations, the Prime Minister's office said on March 11. The attacks began on the evening of March 10 and, although...
A service administrator who destabilized the educational network has been brought to court.
In Los Angeles, charges were brought against a local resident who managed a service for conducting DDoS attacks on an order that offered its services to mercenaries.
Scott Esparza, known online under...
A Russian IP address is no longer a security guarantee.
A new report from Qrator Labs, which specializes in network security, provides an analysis of the situation with DDoS attacks on the Russian IT infrastructure for 2023. The study revealed that hackers have learned to successfully bypass...
The regular Gcore Radar report reveals the latest trends in distributed attacks.
Gcore, a cybersecurity company, recently published its regular Radar report on trends in DDoS attacks.
The report shows a significant increase in the power of DDoS attacks over the past three years, exceeding 100%...
Вступая в 2024 год, Gcore выпустила свой последний отчет Gcore Radar, публикуемый два раза в год, в котором компания публикует внутреннюю аналитику для отслеживания DDoS-атак. Широкая, распределенная по всему миру сеть центров очистки Gcore позволяет им отслеживать тенденции атак с течением...
The developers of the collaborative development platform SourceHut published a report on an incident, as a result of which the service was disrupted for 7 days due to a long-term DDoS attack, for which the project’s infrastructure was not ready. Basic services were restored on the third day, but...
Была обнаружена новая мультиплатформенная угроза под названием NKAbuse, использующая децентрализованный протокол однорангового сетевого подключения, известный как NKN (сокращение от New Kind of Network) в качестве канала связи.
"Вредоносное ПО использует технологию NKN для обмена данными между...
Самый последний отчет Gcore Radar и его последствия выявили резкое увеличение числа DDoS-атак во многих отраслях. В начале 2023 года средняя мощность атак достигла 800 Гбит / с, но сейчас неудивителен даже пик в 1,5+ Тбит/с. Чтобы попытаться взломать защиту Gcore, злоумышленники предприняли две...
Both simple routers and video surveillance devices are at risk.
According to fresh data provided by cybersecurity company Akamai, researchers recently discovered a new botnet based on the legendary Mirai malware.
The malicious infrastructure is called "InfectedSlurs". For distribution, it uses...