Since its emergence in 2016, the Mirai botnet has been a significant concern for cybersecurity professionals worldwide. Today it remains at the forefront of distributed denial-of-service (DDoS) threats. Corero cybersecurity engineer Huy Nguyen aids the understanding of why Mirai continues to be so prominent, through his report, titled “Mirai and Its Common Attack Methods.” The […]
Read More… from New Research: Mirai’s Evolution and Its Increasing Effectiveness
Over the last few weeks, we’ve been writing about the rapid growth of DDoS carpet bomb attacks. Today, the Corero Threat Intelligence team is back with another major observation from 2022: the return of Mirai. Or, more specifically, Mirai-like botnet attacks. In our 2023 DDoS Threat Intelligence Report, our researchers note that many recent distributed […]
Read More… from Why We’ll Be Seeing More Mirai-Like DDoS Attacks This Year
Last week security researchers discovered a vulnerability in the Apache Log4j logging utility code, written in the Java language. This utility is widely used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. The discovered vulnerability can be used by attackers to […]
Read More… from Alert: Apache Log4j Vulnerability Could Impact a Third of All Web Servers: Enables Mirai, Muhstik Botnets and Other Malware
Table of Contents What is the Mirai Botnet? Mirai is a self-propagating botnet virus. The source code for Mirai was made publicly available by the author after a successful and well-publicized attack on security writer Brian Krebs’ website. Since then, the source code has been built and used by many others to launch attacks […]
Read More… from Understanding the Mirai Botnet Attack Type
Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their […]
Read More… from Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data
Table of Contents Introduction While the word ‘botnet’ might conjure up thoughts of bad 1990s action movies wildly guessing at what the 21st century would be like, it’s actually ‘a thing’ now, and not just that — it’s something that’s become increasingly prevalent in discussions about cybersecurity. Understanding what a botnet is and how botnets […]
Read More… from What is a Botnet?
Your trusted defender As your ally in network defense, we’re always on the front lines for you. We’re here, not just to react swiftly to threats, but to strengthen our defenses, ensuring your services flow smoothly and uninterrupted. Having the Corero Threat Research Team by your side promises safety and reliability. With us, you’re not […]
Read More… from Corero Threat Research
DDoS attacks aren’t going away, and they continue to evolve, but that doesn’t mean nothing can be done. In a recent webinar, our CTO Ashley Stephenson and Steve Mulhearn, VP of Sales for EMEA and APAC, discussed the key findings from our 2023 DDoS Threat Intelligence Report, and provided recommendations for defending against these types […]
Read More… from Webinar Recap: Insights from our 2023 Threat Intelligence Report
DDoS attacks continue to pose a significant risk to the stability and availability of online services. As soon as one threat vector is thwarted, another springs up. One of these vectors is DNS attacks — malicious DDoS traffic carried through UDP Port 53: Domain Name Service. The 2023 Corero Threat Intelligence Report has revealed a […]
Read More… from DNS DDoS Attacks Have Doubled. What Does That Mean for Your Company?