• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Types of Attack

Recursive GET and Random Recursive GET Attacks: What’s the Difference?

April 26, 2018 By TheNewsTeam

A Recursive GET attack is a variant of the Excessive Verb attack, or HTTP Flood, in which attackers send huge amounts of legitimate HTTP requests to a server to overwhelm it so that it will deny service to legitimate users. These can be in the form … [Read more...] about Recursive GET and Random Recursive GET Attacks: What’s the Difference?

What is a LAND Attack?

April 26, 2018 By TheNewsTeam

A LAND (Local Area Network Denial) attack is a DDOS attack that involves sending a special poison spoofed packet to a device, which makes it lock up. It also known as a Same Source/Dest Flood. The victim receives fake TCP SYN packets at an extremely … [Read more...] about What is a LAND Attack?

What is a Specially Crafted DDoS Attack?

April 26, 2018 By TheNewsTeam

In a specially crafted packet attack, attackers customize their approach to DDoS. Attention from the security community has recently focused more on these kinds of fragmented and application-layer DDoS attacks, in addition to the volumetric and … [Read more...] about What is a Specially Crafted DDoS Attack?

What are SSL-based DDoS Attacks and How to Mitigate Them

April 20, 2018 By TheNewsTeam

SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them

What was the PBot Botnet?

April 20, 2018 By TheNewsTeam

The PBot botnet was the most significant DDoS malware around in Q2 2017. Malicious actors employed decades-old PHP code to craft the largest attack that security firm Akamai observed in the second quarter of last year, according to its quarterly … [Read more...] about What was the PBot Botnet?

DNSSEC and the Problems it Unintentionally Creates

April 5, 2018 By TheNewsTeam

DNSSEC stands for Domain Name System Security Extensions, the intention of which is to protect DNS entries from attacks. DNS Security has been a focus of recent ‘improved’ security procedures, and if properly configured, adds a helpful layer of … [Read more...] about DNSSEC and the Problems it Unintentionally Creates

Multi-Vector DDoS Attacks are on the Rise

April 5, 2018 By TheNewsTeam

Multi-vector DDoS attacks are when an attacker quickly shifts from launching one kind of DDoS attack to another to another. Chaining together different forms of DDoS attack has become a popular mode of attack since late 2015, and shows no sign of … [Read more...] about Multi-Vector DDoS Attacks are on the Rise

Code for MemCached DDoS Attacks Made Public

March 18, 2018 By TheNewsTeam

The tools for launching the record-setting MemCached DDoS attacks of early March were made public shortly afterwards. Proof-of-concept code named “MemCached-DDoS-Exploit” was posted on GitHub, listed as a “DDoS attack tool for sending forged UDP … [Read more...] about Code for MemCached DDoS Attacks Made Public

MemCached DDoS and Ransomware

March 10, 2018 By TheNewsTeam

Over the past week, it has become clear that attackers are seizing the memached DDoS attack vector as an opportunity to extract payments from attacked companies. Akamai reported that a group of DDoS attacks executed using memcached servers were … [Read more...] about MemCached DDoS and Ransomware

Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks

March 10, 2018 By TheNewsTeam

Researchers at DDoS protection firm Corero Network Security have released a post stating that the memcached amplification attacks that hit GitHub and other networks over the last week with the largest ever DDoS attacks can be disarmed with a … [Read more...] about Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks

What is Memcached DDoS?

March 10, 2018 By TheNewsTeam

Memcached is a tool used to cache data and lessen strain on large data stores, such as disk or databases. The memcached protocol involves the server being queried for information about key value stories. It was built to be used on systems that are … [Read more...] about What is Memcached DDoS?

Massive Memcached DDoS Attacks Mark Largest Ever

March 10, 2018 By TheNewsTeam

Last week, code repository GitHub experienced the most powerful DDoS attack recorded to date at 1.35 Tbps. No botnet was required, and it used an increasingly popular DDoS method. GitHub’s site was only down for 10 minutes as it automatically … [Read more...] about Massive Memcached DDoS Attacks Mark Largest Ever

Key Takeaways on DDoS from Akamai’s Q4 2017 Report

March 1, 2018 By TheNewsTeam

Akamai’s latest security report, focused on Q4 2017, noted that DDoS attacks went up by 14% year-on-year. Application-layer attacks rose by 115% quarter by quarter, however, they still comprised under 1% of all DDoS attacks. Year-on-year, there was … [Read more...] about Key Takeaways on DDoS from Akamai’s Q4 2017 Report

Mitigating Against XML and HTTP-DoS and DDoS Attacks

January 25, 2018 By TheNewsTeam

There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks

XML-DoS and HTTP-DoS Attacks in the Cloud

January 25, 2018 By TheNewsTeam

XML and HTTP DoS or DDoS attacks both aim to exhaust server resources. EXtensible Markup Language (XML) and HyperText Transfer Protocol (HTTP) are both used extensively in cloud computing web services. Not very much work has been done to ensure … [Read more...] about XML-DoS and HTTP-DoS Attacks in the Cloud

Next Page »

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.