• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

TheNewsTeam

How to Select a DDoS Protection Service: Part II

February 22, 2018 By TheNewsTeam

Numerous factors are important in selecting a DDoS protection service. As we covered in the first post, three of the most important areas to look at are infrastructure, methodology and deployment. Two further categories to consider include the level … [Read more...] about How to Select a DDoS Protection Service: Part II

How to Select a DDoS Protection Service: Part I

February 22, 2018 By TheNewsTeam

Threat mitigation and protection involves three elements: infrastructure, methodology and deployment. You need a provider who can supply all three protection layers. Their network needs to be able to handle heavy traffic and have an elastic … [Read more...] about How to Select a DDoS Protection Service: Part I

How to Protect Your Business from DDoS

February 22, 2018 By TheNewsTeam

By having your business online, you are immediately a target for hackers. Market research tells us that DDoS attacks are becoming ever more popular and sophisticated, and can cause serious financial damage when they occur. According to the U.S. … [Read more...] about How to Protect Your Business from DDoS

The Last Decade in DDoS

February 17, 2018 By TheNewsTeam

DDoS attacks have seen a huge explosion in size and scale over the last decade. The last three years alone have seen the largest DDoS attack in history milestone be repeatedly knocked down. One of the most interesting of these in terms of politics … [Read more...] about The Last Decade in DDoS

The Early Days of DDoS Protection & Mitigation – Part 3

February 17, 2018 By TheNewsTeam

The Early Days: 2004-2007 There were many radical shifts in scale to the Internet across this period. In 2004, the Internet2 backbone (Abilene) was upgraded from 2.5gb/sec to 10gb/sec. and was set to deploy the next generation Internet protocol, … [Read more...] about The Early Days of DDoS Protection & Mitigation – Part 3

The Early Days of DDoS Protection & Mitigation – Part 2

February 17, 2018 By TheNewsTeam

The Early Days: 2001-2003 Attackers across this period increasingly switched from being script kiddies fooling around like Mafiaboy to being part of a criminal organization. The implications for taking down a business network became increasingly … [Read more...] about The Early Days of DDoS Protection & Mitigation – Part 2

The Early Days of DDoS Protection & Mitigation – Part 1

February 17, 2018 By TheNewsTeam

The Early Days: 1995-2000 Business on the Internet didn’t really get going until 1995 when Jeff Bezos founded Amazon.com and Pierre Omidyar began AuctionWeb, which would become eBay. There were very few defenses in place at that time, as the … [Read more...] about The Early Days of DDoS Protection & Mitigation – Part 1

The Mirai Copycats

February 17, 2018 By TheNewsTeam

On September 30, 2016, Mirai’s alleged author, nicknamed “Anna-senpai” (who we now know was Paras Jha from Farnwood, N.J.) released the Mirai source code on Hackforums, an infamous online hacking forum. Along with it, he wrote a post, announcing his … [Read more...] about The Mirai Copycats

Accidental DDoS

February 17, 2018 By TheNewsTeam

Kaspersky Labs just published a report on DDoS attacks in Q4 2017 and found that a surprising number of DDoS attacks are not motivated by financial gain or to profit on the huge spike in Bitcoin, but are in fact the accidental outcome of botnet side … [Read more...] about Accidental DDoS

The Demise of the Election Hacking Kelihos Botnet

February 10, 2018 By TheNewsTeam

Last April, the U.S. Justice Department was finally able to report that a suspect had been arrested in the Kelihos botnet case. Peter Yuryevich Levashov, a Russian citizen who allegedly ran the Kelihos botnet since at least 2010, was arrested in … [Read more...] about The Demise of the Election Hacking Kelihos Botnet

What is The Digital Attack Map?

February 9, 2018 By TheNewsTeam

The Digital Attack Map is a free online resource, which allows you to observe in real time the top DDoS attacks worldwide on a daily basis. Data shown represents only the top 1% of reported attacks around the world. The map allows you to search … [Read more...] about What is The Digital Attack Map?

How Jack Chappell Avoided Jail Time for His Role in vDos

February 9, 2018 By TheNewsTeam

In July 2017, British man 19-year-old Jack Chappell was arrested by the U.K. police and charged with using the vDoS attack-for-hire service to launch attacks against various U.K. and U.K.-based companies, including the BBC, British Telecom, Virgin … [Read more...] about How Jack Chappell Avoided Jail Time for His Role in vDos

vDoS Booter Service and the Attack against Brian Krebs

February 9, 2018 By TheNewsTeam

Before Mirai came into the public eye, the FBI was working on a case involving two teens running a DDoS-for-hire service called vDOS. Two young Israeli men were using the massive vDOS botnet to offer a booter service, aimed at helping gamers knock … [Read more...] about vDoS Booter Service and the Attack against Brian Krebs

How the FBI took down the Mirai creators

February 9, 2018 By TheNewsTeam

At the end of last year, the FBI filed charges against the creators of Mirai, the largest DDoS attack of its kind when it struck the DNS provider, Dyn in October 2016 and took down the sites for some of the largest companies in the U.S., including … [Read more...] about How the FBI took down the Mirai creators

DDoS Case Study: Ababil, the Longest Cyber Attack in History

February 2, 2018 By TheNewsTeam

Operation Ababil began on September 18th, 2012 and continues to this day. It is the longest continuous cyber attack in history, comprised of multiple different waves and phases utilizing a variety of DDoS attack types. They were launched by the Cyber … [Read more...] about DDoS Case Study: Ababil, the Longest Cyber Attack in History

« Previous Page
Next Page »

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.