• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

malware

DDoS and the Cryptocurrency Craze

May 4, 2018 By TheNewsTeam

DDoS attackers have gained a new target with the rise in value of cryptocurrency and the corresponding boom in new cryptocurrencies, namely the exchanges that power the trades between different cryptocurrencies, in addition to the computer systems … [Read more...] about DDoS and the Cryptocurrency Craze

The Demise of the Election Hacking Kelihos Botnet

February 10, 2018 By TheNewsTeam

Last April, the U.S. Justice Department was finally able to report that a suspect had been arrested in the Kelihos botnet case. Peter Yuryevich Levashov, a Russian citizen who allegedly ran the Kelihos botnet since at least 2010, was arrested in … [Read more...] about The Demise of the Election Hacking Kelihos Botnet

Smokescreen DDoS Attacks

January 18, 2018 By TheNewsTeam

DDoS attacks are employed as a smokescreen for other more malicious cyberattacks more often than you might think. The swarming nature of DDoS can be an effective distraction technique; as cybersecurity teams focus on mitigating the attack and getting … [Read more...] about Smokescreen DDoS Attacks

What is an HTTP Flood?

December 23, 2017 By TheNewsTeam

In a HTTP Flood, attackers send vast numbers of legitimate HTTP requests to a server. The request can either be “GET” or “POST”. The goal of this kind of DDoS attack is to force the server to allocate so many of its resources to serving the attack … [Read more...] about What is an HTTP Flood?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.