• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Business Rivalry DDoS

Mirai and Minecraft

March 1, 2018 By TheNewsTeam

When the three U.S. hackers, Paras Jha, Josiah White and Dalton Norman, pled guilty to creating the Mirai botnet last year, it became apparent from a Wired investigation that the three had created the botnet in the first place to create a competitive … [Read more...] about Mirai and Minecraft

DDoS Case Study: Phil Nagy and the Winning Poker Network

February 2, 2018 By TheNewsTeam

Just As Phil Nagy, the founder of the Winning Poker Network and American Cardroom, was holding a big tournament last summer, his network was struck by a powerful denial-of-service attack, which forced Nagy into postponing or scrapping various events. … [Read more...] about DDoS Case Study: Phil Nagy and the Winning Poker Network

The Men Behind Mirai

February 2, 2018 By TheNewsTeam

Last month, three men pleaded guilty to creating the Mirai botnet, in which hundreds of thousands of connected digital video records, routers and cameras were used to launch a massive DDoS attack against the domain name services company, Dyn for an … [Read more...] about The Men Behind Mirai

Player Advantage DDoS Attacks: the Beginnings of DDoS

January 18, 2018 By TheNewsTeam

Player advantage DDoS attacks fall into a similar attack motivation bracket as business rivalry motivated attacks. We wrote elsewhere about this. Taking down or slowing the service of a rival competitor can significantly affect their bottom line, … [Read more...] about Player Advantage DDoS Attacks: the Beginnings of DDoS

Business Rivalry DDoS Attacks: Do Businesses Really Attack Each Other?

January 6, 2018 By TheNewsTeam

Business rivalry is thought to be the root cause of many DDoS attacks, say majority of DDoS victims. Research conducted last year by Kaspersky Lab and B2B International yielded several interesting insights into this mindset. They found that targeted … [Read more...] about Business Rivalry DDoS Attacks: Do Businesses Really Attack Each Other?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.