Enterprise DDoS Protection Posts

Survey Indicates Lack of Enterprise DDoS Awareness and Protection

Last month, I had the honor to host a workshop at the R3: Resilience, Response & Recovery Summit in London, with two of my fellow Corero colleagues: Sean Newman and Peter Cutler.

Read more

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

Pundits Speculate: Did Russian Hackers Launch DDoS Attacks on Dutch Organizations?

The Dutch national tax office said its website went offline briefly, for 5-10 minutes. Regardless of how long they were under DDoS attack, those afflicted Dutch organizations should also be concerned about a security breach.

Read more

The Rise of IoT Botnet Threats and DDoS attacks

IoT devices still suffer from basic security vulnerabilities and it is precisely this lack of security that makes them so attractive to hackers. But it’s not just a password problem anymore.

Read more

DDoS Attacks Can Be Weapons in Cyber Warfare

Banks, energy utilities, transportation hubs and hospitals; these are the most high-profile examples of critical infrastructure that could be targeted by hackers.

Read more

Mitigation Time Matters: The Difference between Seconds and Minutes

Organizations cannot afford to be slow in mitigating distributed denial of service (DDoS) attacks, no matter how large or small the attack.

Read more

Survey Says More than One Third of US Businesses Experience DDoS Attacks

DDoS attacks cost not only time and money in the form of internal or external IT resources to bring a company’s network back online, but also create loss of revenue, brand reputation and customer trust.

Read more

DDoS Attacks on Internet Providers Can Impact Downstream Customers

Enterprises need to consider that even if they have protection against distributed denial of service (DDoS) attacks, their business could be taken offline if their Internet Service Provider (ISP), hosting provider or Domain Name Service (DNS) provider does not have adequate DDoS protection.

Read more

Cyber Insurance and DDoS Attack Protection

This past spring American International Group (AIG), one of the largest cyber insurance companies, surveyed cyber security and risk experts to gain a deeper understanding of their views of the likelihood and impact of a systemic cyber-attack.

Read more

DDoS Botnets, North Korea and the Threat of Cyber War

U.S. federal law enforcement and computer security agencies recently released a rare security alert, citing that a North Korean hacking group is actively targeting media, aerospace, financial, and critical infrastructure sectors in the United States and around the world. The hackers are believed to have used a botnet creation malware called DeltaCharlie to launch DDoS attacks.

Read more

How to Handle DDoS Attacks: A Critique of DDoS Myths

A recent TechSpective article listed 20 ways to help prevent a DDoS attack. Some of the suggestions are helpful, but many of them have little benefit against the types of DDoS attacks which are common today. So, in the interest of busting some DDoS myths, this blog puts the recommendations in context.

Read more

Ponemon Report Weighs in on the Internet of Things

According to Dark Reading, a new Ponemon Institute report states that a majority of companies rely on legacy technologies such as network firewalls and intrusion prevention systems (IPS) to ward off cyber threats such as malware, ransomware and distributed denial of service (DDoS) attacks.

Read more

Attack Detection: The Crucial First Step in DDoS Mitigation

If your IT security system fails to detect and block the majority of DDoS attacks, how can you be sure that your network is truly safe from other incursions?

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

5 Essential Qualities to Look for in a DDoS Mitigation Solution

When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.

Read more

What ISPs Need To Know About CLDAP DDoS Attack Vectors

The Corero Security Operations team has identified significant exploitation of the CLDAP attack vector in attack attempts against its customers since it was first disclosed in October 2016.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

Myths that Surround Cloud-based DDoS Mitigation

Now that DDoS attacks are a common occurrence for many companies, more organizations are rightfully worried about protecting their servers and web applications. With that wave of concern comes a slew of advice—some good, some bad—from IT experts about the best anti-DDoS approaches. One example of bad advice is to suggest that organizations can rely exclusively on cloud-based mitigation.

Read more

How Can a DDoS Attack Be Part of a Security Breach?

A recent study by BitDefender showed that 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. Companies must realize that DDoS attacks are often part of the toolkit for cyber criminals to launch a security breach.

Read more

Is DDoS Protection Worth the Investment?

Anti-DDoS technology has often been difficult or costly for individual organizations to deploy. Fortunately, DDoS defense solutions have evolved, enabling hosting providers and ISPs to offer affordable DDoS protection to their customers.

Read more

Lack of IoT Security Fuels Terabit DDoS Attacks

Learn why unsecured IoT devices have become the backbone source for current and future multi-terabit distributed denial of service (DDoS) attacks.

Read more

DDoS Attacks, Who Dunnit? The Fight for Improved Detection and Protection

A recent Kaspersky Lab study found that many businesses that have suffered DDoS attacks believe that their competitors launched the attacks. Is there evidence to support their beliefs?

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

If You Haven’t Already Been DDoS’ed, Assume You Will Be

Some companies are keenly aware of attacks on their networks, but other companies are not. Even in some companies that have dedicated IT security staff and systems in place, major security breaches have occurred. It can take months or even years for an organization to realize that it has been breached.

Read more

DDoS Attacks Won't Be Blocked by Black Holing/Null Routing

Anti-DDoS solutions have evolved dramatically over the past few years, so it’s surprising to see occasional articles that still recommend outdated approaches, such as remote black holing (also called null routing) to stop unwanted traffic.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

Untangling the Dark Web behind Mirai IOT Botnet DDoS Attacks

Security researcher Brian Krebs believes he has unraveled the mystery of who launched a massive Mirai botnet DDoS attack on his site in September of 2016. If Krebs’ allegation is true, then this is a seamy tale of a good programmer who went bad: a white hat turned into a black hat.

Read more

Could Volumetric DDoS Attacks Shut Down the Internet?

Many people are now asking the question, were the 2016 DDoS attacks just warm-up drills or test runs for even larger attacks that would cripple large parts of the Internet? The potential certainly exists; is it probable?

Read more

Traditional Layers of Defense Are Not Enough to Stop DDoS Attacks

Although DDoS mitigation solutions have been around for nearly 20 years, there are still some myths about DDoS attacks and much debate about how to best protect a network.

Read more

DDoS Hackers for Hire

Unfortunately, just in the past few weeks it’s become exponentially easier to launch a massive DDoS attack. There are two reasons for this evolution.

Read more

The Dangers of Underestimating DDoS Attacks

Organizations should be wary of being quick to claim that their business systems have not been affected by a DDoS attack, because this can be extremely difficult to ascertain.

Read more

How to Handle Terabit-Scale DDoS Attacks

In the wake of so many DDoS attacks in recent months/years, many enterprises and agencies are seeking ways to protect themselves from such attacks, and the burden of stopping DDoS attacks should fall mostly on Internet Service Providers and Hosting Providers.

Read more

BlackNurse DoS Attack – What You Should Know

Researchers have warned that a low-volume BlackNurse DoS attack can easily take down certain firewalls.

Read more

Will Companies Suffer DDoS Attacks on Cyber Monday?

Most of the time, Cyber Monday attacks have taken the form of phishing scams and theft of data such as credit card numbers and email addresses. There have not been many major DDoS attacks on Cyber Monday, but with the way DDoS attack trends are going, there is still reason for concern.

Read more

DDoS Attacks, Security Breaches Validate the Need for National Cyber Security Awareness

It’s very apropos that October is National Cyber Security Awareness Month because this month and the preceding month have been chock full of record-breaking cyber attacks.

Read more

Modern or Legacy DDoS Protection? The Important Differences

DDoS attacks have evolved over the years and, thankfully, so has DDoS protection technology. However, not all DDoS solutions are equal.

Read more

Meet Corero’s Family of DDoS Mitigation Hardware

If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.

Read more

Massive Botnet Attack Proves That Firewalls Offer No DDoS Protection

A massive botnet DDoS attack, composed of approximately 25,500 compromised closed-circuit television (CCTV) systems, has been ongoing for the past few weeks, attacking various businesses across the globe. A firewall offered no protection.

Read more

New Report Points to Alarming DDoS Attack Statistics and Projections

A new report from Cisco includes data on DDoS attacks worldwide, citing increased size and frequency of attacks. However, Corero finds that the vast majority of attacks targeting customers are 1Gbps or less in size.

Read more

All Gigs Are Not Created Equal: DDoS Protection Makes a Difference for ISPs

When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.

Read more

Benefits of Real-Time DDoS Protection

If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.

Read more

Key Components of Our DDoS Monitoring Tool for Virtual Machines

Corero’s latest product, the SmartWall® Threat Defense - Virtual Edition (vNTD Monitor), allows service providers who are looking to scale out their security analytics environment to simply “drop” security visibility into any part of their network to analyze the nature of a threat.

Read more

Distributed Denial of Service Attacks are Preventable!

A news story about the recent DDoS attack on the Hawaii Better Business Bureau illustrates common misperceptions about effective DDoS protection.

Read more

Protect Your Network from Cyber Extortion with a DDoS Protection Solution

This week ushered in several news articles about recent DDoS extortions that turned out to be scams conducted by some hackers who pretended to be part of the Armada Collective. Some businesses paid the ransom fee, but they could have avoided the entire problem if they had adequate DDoS protection in place.

Read more

Corero Receives “Recommended” Rating in NSS DDoS Prevention Solutions Security Value Map

Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.

Read more

Survey: DDoS Attacks Cause Loss of Customer Trust & Decreased Revenues

We've released the results of our annual DDoS Impact Survey, which polled technology decision makers, network operators and security experts about key DDoS issues and trends that Internet service providers and businesses face in 2016. Nearly half (45%) of the survey participants indicated that loss of customer trust is the most damaging consequence of DDoS attacks to businesses. See our infographic that sums up rest of the survey results!

Read more

Introducing the Corero Virtual Edition (vNTD) Monitor – a DDoS Detection Engine

Last week we announced a new product: vNTD Monitor, which provides the freedom and flexibility to monitor DDoS activity in real-time against any server, application or network. This industry-leading technology provides visibility of attack traffic, intuitive analytics and alerting of DDoS attack vectors targeting a system or workload.

Read more

Clear and Comprehensive Visibility into DDoS Attack Mitigation

Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.

Read more

Going After the People Behind DDoS Attacks

There are two aspects of fighting DDoS attacks. One is remediation—stopping the attack when it comes in. Corero and other providers have this part of the equation covered. The other aspect of stopping attacks has to do with law enforcement, which can be done only with the help and support of the victim companies.

Read more

DDoS Attacks Rise in Size, Sophistication and Frequency

Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.

Read more

Mitigating Multi-Vector DDoS Attacks

Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.

Read more

On the Upswing: Cyber Insurance to Cover the Liability of DDoS Attacks

Cyber insurance is not a substitute for making smart investments in cyber security and following industry best practices. However, it is an important part of almost any business's risk mitigation strategy.

Read more

What Motivates DDoS Attackers?

Whether motivated by greed, cheap thrills or politics, DDoS hackers wreak havoc on websites. The best protection is prevention: defensive solutions that can detect and stop DDoS hackers in their tracks before they do any damage.

Read more

This new hacktivism tactic makes every organization with a web presence a potential target for a DDoS attack

Hacktivism is on the rise as a motivation behind numerous DDoS attacks. For whatever reason, groups like Anonymous, Lizard Squad, Syrian Electronic Army, Chaos Computer Club and others believe they can intimidate corporations, government agencies, and other institutions by knocking these entities' websites offline for a period of time. One of the latest victims of a hacktivist attack is the Japanese carmaker Nissan.

Read more

This week in DDoS attacks – Protest and Activism

Ideological motivations for DDoS attacks can impact anyone at any time. This week, two high profile organizations Planned Parenthood and New York Magazine were severely impacted by ideological hacktivists taking down their websites with DDoS attacks.

Read more

DDoS Attack Kicks Canadian Government Websites Offline

The Canadian Federal Government’s network service availability was impacted by reported ‘large-scale’ DDoS attacks earlier this week.  Reports indicate that the illustrious Anonymous group has claimed responsibility for these outages, due to outrage over the recently passed anti-terror Bill C-51.  Attacks left the...

Read more

Industry Observations of DDoS Trends

Observing and analyzing DDoS attacks over a period of time helps us all understand trends so that we can better prepare for the future. Verisign has recently published its DDoS Trends Report for the last half of 2014, and there are some interesting observations. For one thing, attacks are growing larger in size. In the attacks observed by...

Read more

More than half of U.S. businesses were targeted by a DDoS attack last year. Was yours among them?

How pervasive have DDoS attacks become? According to research from the global network services company BT Global Services, two out of every five organizations worldwide were targeted by DDoS attacks last year. That's the global average. In the United States, more than half (58%) of all organizations were targeted. Those aren't good...

Read more

What Does a DDoS Attack Really Cost? It Depends...

In a recently released report companies estimated the average cost of a successful DDoS attack – one that actually disrupts a target's business – is $40,000 per hour. $40,000 per hour. It's a nice composite number that is easy to present to management when you need to justify a budget for preparing for the potential of a...

Read more

Why would anyone launch a DDoS attack against us?

During my travels across the globe I meet lots of people, and it always amazes me when individuals continue to believe that they are not susceptible to a DDoS attack. I frequently hear, “Why would anyone attack us, why should we plan for an impending DDoS attack?”  Believe it or not statistics show that over 40% of online...

Read more

D'oh! Get Your Hammer and Your Payment Card Hacked at "the Homer Depot"

By now the news of the massive payment card data breach at the Home Depot is well known. The company has acknowledged the theft of an estimated 56 million debit and credit card numbers, making it the largest retail breach on record. In a September 18 press release confirming the breach, the merchant says malware discovered on its systems...

Read more

Specially Crafted Packet DoS Attacks, Here We Go Again

One of the unique types of Denial of Service (DoS) attacks involves the usage of specially-crafted packets.  Most cybersecurity professionals are already familiar with volumetric and amplified DDoS attacks, but more recent attention has been surrounding fragmented and application-layer DDoS attacks. However, few understand what a...

Read more

A Real Story About Successful DDoS Mitigation

If you’re a cybersecurity professional, you may be all too familiar with the risks associated with DDoS attacks. Over the years, the threat landscape has had detrimental effects on organizations. Including, system downtime, brand damage, loss of customer confidence, and ultimately negatively impacting your bottom line. These implications can...

Read more

DDoS Attacks Hit the World Cup. The Current Score: Anonymous 1, FIFA 0

The world’s most watched sporting event, the World Cup, is now underway in Brazil. Despite an expected audience of billions over the next few weeks, not everyone is a fan. Protesters of every ilk are using the prominence of this event to make a point. That includes hacktivists from Anonymous and other cyber groups looking for...

Read more

Finding Needles in the Haystack of Security Events

I hate to throw a cliché at you, but when it comes to security event and log management, a picture (or a handful of pictures) is certainly worth a thousand words.  Security devices generate volumes of raw data, usually in a proprietary manner.  Parsing such unstructured data and making sense out of it is a tedious, if not an...

Read more

2014 – The rise and fall of the NTP Reflection Attack

I think the industry should set a goal to eliminate the NTP reflection attack before the end of 2014.   I’m talking about total eradication, and I’ll tell you why I think it is possible.  Although the ICS Cert was published in February of this year, the big news about NTP attacks started at the end of 2013, so...

Read more

Life in the Fast Lane

Many of us buy premium gas at gas stations, premium seats on airlines, premium upgrades at hotels and premium groceries at boutique retailers.  If individuals or their respective businesses are willing to pay for a premium service, why would anyone oppose it?  I ask this question as we await a ruling from the FCC as it relates...

Read more

What’s Hiding Behind that DDoS Attack?

Multi-vector patterns of DDoS attacks are becoming more commonplace in the world of cyber warfare. From the volumetric attacks aimed to fill your pipe and squeeze your Internet bandwidth down to nothing, to the low and slow application layer attacks that sneak right through traditional defenses – combination attacks are becoming the norm....

Read more

Attack of the Month Video Blog Series: Network Layer Attacks In ICS

In the world of Industrial Control Systems (ICS) system outage or infiltration can result in system downtime, loss of productivity and loss of revenue, as well as loss of confidentiality, integrity and availability. Additionally, system outage or infiltration could possibly result in loss of life often due to the critical nature of these devices....

Read more

Business Lessons from the DDoS Attacks on Social Networking Site Meetup

In early March, the social networking site Meetup was hit by a series of DDoS attacks. The attacks did some damage, not the least of which was knocking the site offline for hours at a time over a period of several days. However, I have to say that it appears that the Meetup management and technical team did a few things right to get through this...

Read more

Watch for DDoS Attacks as a Diversionary Tactic for Other Types of Cyber Crime

Have you heard of a smash-and-grab robbery? In the physical world, it usually refers to a group of thugs who storm a retail store – often a jewelry store or a pawn shop – and smash the display cases with sledge hammers. They grab all the expensive merchandise they can get and run out of the store before shocked store clerks have much...

Read more

Attack of the Month Video Blog Series: Reflective (Amplified) DDoS Attacks

Happy New Year everyone! I'm pleased to kick off 2014 with another dynamic video blog post. Today's video discusses the real threat of Reflective, or as some call them, Amplified DDoS Attacks.  As you may recall from our initial v-blog post the goal for these 5 minute sessions is to dissect and analyze a specific attack type each...

Read more

Two DDoS Attackers are Given 5 Year Jail Terms for Blackmail, Unauthorized Impairment of Computers

Polish computer programmers Patryk Surmacki and Piotr Smirnow were recently sentenced to 5 years and 4 months in jail for perpetrating a blackmail scheme that also involved the use of a DDoS attack as intimidation. Prior to sentencing, the pair plead guilty to blackmail and they admitted to conspiracy to access, use and impair computers without...

Read more

Guilty Pleas for 13 People Involved in a PayPal DDoS Attack, and a (Strange) Call for Leniency from the Founder of PayPal’s Parent Company

On December 6, thirteen defendants pleaded guilty in U.S. federal court to charges related to their involvement in the cyber-attack of PayPal’s website as part of the group Anonymous. In pleading guilty, the defendants admitted to carrying out a Distributed Denial of Service (DDoS) attack against PayPal in December 2010. Ten of the...

Read more

Gartner VP Confirms DDoS Attacks Were Used as Smoke Screens to Hide Financial Fraud

In an article posted on BankInfoSecurity.com, Gartner Research vice president Avivah Litan confirms that some of the DDoS attacks that have rippled through the banking industry over the past year have been a cover-up for fraud. While bank cyber security personnel were distracted in combating the denial of service attacks, hackers were busy...

Read more

Incapsula: Wordpress Default Setting Opens up Sites to DDoS Exploit

Popular content management system Wordpress is harboring a default setting that is making is susceptible to compromise, according to recent research. Gur Shatz, CEO of IT security vendor Incapsula, wrote in a blog post that a recent Distributed Denial of Service (DDoS) attack mitigated by his firm exposed this vulnerability.

Read more

Small, but Mighty: Three-Quarters of DDoS Attacks Less Than 100 Mbps

More than a third of companies endured a disruptive attack last year, according to a new survey [pdf]. Thirty-five percent of those surveyed across industries dealt with at least one Distributed Denial of Service (DDoS) incident, with attacks on the retail sector seeing the largest year-to-year increase (16 percent to 39 percent), making for a...

Read more

Flooded: DDoS Bandwidth Increased 700 Percent During Q1 2013

The DDoS tidal wave continues to grow. The average Distributed Denial of Service (DDoS) attack bandwidth totaled 48.25 Gbps in the first quarter of 2013, a 718% increase over last quarter, and the average packet-per-second rate reached 32.4 million, according to a new report by DDoS defense provider Prolexic. Prolexic culled data from their...

Read more

Anonymous' DDoS Attack Against Israel Leverages Botnet Network

Botnets were responsible for the recent cyber attack aimed at Israel, according to a review of the incident from Trend Micro. On April 7, the hacktivist group Anonymous reportedly began a targeted Distributed Denial of Service (DDoS) campaign against various Israeli websites i/blog/wp-admin/post.php?post=6834&action=editn retaliation for...

Read more

Reddit: "It was a Legit, Malicious DDoS Aimed at Taking us Down"

The popular link sharing site Reddit has been enduring a large Distributed Denial-of-Service (DDoS) attack since earlier this morning, according to a statement made via Twitter. As the day moves on, the site appears to have survived the attack, but according to Reddit's Twitter status alert, while they have "mitigated a decent portion...

Read more

UK-Based IT Managers Increasingly Concerned About DDoS: Survey

Of all of the threats in the cyber criminals toolkit, the Distributed Denial of Service (DDoS) attack continues to weigh heavily on the mind of UK-based IT managers, according to a recent report. Nearly half (41 percent) of all IT managers surveyed claimed they were ‘highly or extremely’ concerned about their organization being the...

Read more

Mt. Gox: Bitcoin Exchange Under DDoS Attack

Mt. Gox, the largest Bitcoin exchange in the world, is fending off a massive Distributed Denial of Service (DDoS) attack, according to a Facebook post. The digital currency exchange, which is based in Tokyo, said that the ongoing DDoS attack has caused trading lags, generated error messages for users and even shut down the site for a period of...

Read more

DHS Warns Of Telephony Denial Of Service (TDoS) Attacks

The FBI issued a warning back in January, and now the Department of Homeland Security (DHS) has followed suit. A not-so new denial of service attack is once again attracting the attention of authorities. This latest incarnation utilizes the telephone system to inundate public sector entities, tying up the phone lines and preventing legitimate...

Read more

US-Cert Issues DNS Amplification DDoS Alert

Distributed Denial of Service (DDoS) attacks have become a routine part of the security threat landscape, striking banks, online retails sites and other interconnected targets. In addition to the well-publicized ongoing hacktivist DDoS campaign against global financial institutions (which hit, among others, American Express last week), attacks...

Read more

Report: Two-Day Long DDoS Attack Breaches U.S. Utility

While phase three of Operation Ababil is now in full swing, banks are not the only enterprises that remain at heightened cyber threat alert. A new case study issued by anti-DDoS vendor Prolexic recounts a recent Layer 4 Distributed-Denial-of-Service (DDoS) attack leveled against U.S. electric utility. Also referred to as a "syn...

Read more

Gartner: Application Layer DDoS Attacks to Increase in 2013

Volumetric, blunt-force attacks will remain the primary type of Distributed Denial Of Service Attack (DDoS) in the coming year, but there will be noticeable growth in the incidence of low-and-slow application layer DDoS attacks, according to new research by Gartner.

Read more

DoD Proposes Cyber Targeted-Attack Analyzer (CAT) Program

The Pentagon has announced the initiation of a program to develop an integrated threat analysis system that will significantly improve the Defense Department's ability to identify network security vulnerabilities by leveraging the power of Big Data analytics. The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office...

Read more

DDoS in defense of (insert cause) is still criminal

Are hacktivists protesters or criminals? The question is not a matter of semantics; it has real bearing on how we respond, not as members of the security community, who are responsible for protecting IT information and services against attack, but as a society, particularly in the realm of criminal prosecution. My take is that...

Read more

DDoS attacks bring down Polish government websites over support for international anti-piracy agreement

There was a new wave of distributed denial-of-service attacks in protest of anti-piracy activity over the weekend, this time targeting Polish government websites. The attacks came in advance of the Polish government’s expected signing of ACTA (Anti-Counterfeiting Trade Agreement) on Thursday. The loosely knit hacktivist group Anonymous,...

Read more

View earlier posts in the archive