• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

DDoS Motivation

Extortion DDoS Attack: The Lizard Squad’s Notorious Antics

January 6, 2018 By TheNewsTeam

In April 2017, Akamai wrote about a black hat hacker group called The Lizard Squad who were sending extortion letters to businesses, demanding payment in bitcoin to prevent a DDoS attack against their applications. These letters were sent to … [Read more...] about Extortion DDoS Attack: The Lizard Squad’s Notorious Antics

What is the Motivation Behind a DDoS Attack?

January 6, 2018 By TheNewsTeam

DDoS attacks can have various motivations, from hobbyist hackers playing around to cybercriminals carrying out extortion rackets. DDoS attacks are fast becoming the most common type of cyberattack, growing rapidly in volume and number across 2017 and … [Read more...] about What is the Motivation Behind a DDoS Attack?

« Previous Page

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.