ddos

  1. AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data

    Original release date: December 10, 2020<br/><h3>Summary</h3><p>This Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).</p>...
  2. TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 | Last revised: July 07, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...
  3. TA16-288A: Heightened DDoS Threat Posed by Mirai and Other Botnets

    Original release date: October 14, 2016 | Last revised: November 30, 2016 Systems Affected Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data...
  4. TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the...
  5. VIDEO The Biggest DDoS Attack in Internet History?

    :eek:
  6. TA16-288A: Heightened DDoS Threat Posed by Mirai and Other Botnets

    Original release date: October 14, 2016 Systems Affected Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data Overview Recently, IoT devices...
  7. A few security articles PC World put up.

    **Worth Reading** Here are a few articles PC World put up today about security and new threats. Massive DDoS attacks reach record levels as botnets make them cheaper to launch Check your BITS, because deleting malware might not be enough 5 ways to stop spam from invading your email
  8. TA15-337A: Dorkbot

    Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of...
  9. TA15-286A: Dridex P2P Malware

    Original release date: October 13, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United...
  10. Static/Dynamic IP Restrictions -- DDOS Protection | Azure App Service

    In this video, Nazim Lala demonstrates how to configure IP restriction for Azure Web Apps to help secure your web app and to help mitigate Denial of Service attacks against your application. This video will show what Static and Dynamic IP restrictions are and how simple it is to configure them...
  11. TA14-017A: UDP-based Amplification Attacks

    Original release date: January 17, 2014 | Last revised: March 07, 2014 Systems Affected Certain UDP protocols have been identified as potential attack vectors: DNS NTP SNMPv2 NetBIOS SSDP CharGEN QOTD BitTorrent Kad Quake Network Protocol Steam Protocol Overview A Distributed Reflective...
  12. TA14-013A: NTP Amplification Attacks Using CVE-2013-5211

    Original release date: January 13, 2014 | Last revised: February 05, 2014 Systems Affected NTP servers Overview A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to...
  13. TA14-017A: UDP-based Amplification Attacks

    Original release date: January 17, 2014 | Last revised: February 09, 2014 Systems Affected Certain UDP protocols have been identified as potential attack vectors: DNS NTP SNMPv2 NetBIOS SSDP CharGEN QOTD BitTorrent Kad Quake Network Protocol Steam Protocol Overview A Distributed...
  14. TA14-013A: NTP Amplification Attacks Using CVE-2013-5211

    Original release date: January 13, 2014 | Last revised: January 14, 2014 Systems Affected NTP servers Overview A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to...
  15. TA13-088A: DNS Amplification Attacks

    Original release date: March 29, 2013 Systems Affected Domain Name System (DNS) servers Overview A Domain Name Server (DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible open recursive DNS servers to...
  16. Following Spamhaus DDoS Attack, Action Taken. We Seek Your Feedback!

    Hello everyone, Tonight, we implemented CloudFlare, which uses its own content delivery network and content processing. Were the site to go down, content would continue to be available for a number of days, even if our servers that process that data goes down. This is not the first time that we...
  17. TA12-024A: "Anonymous" DDoS Activity

    Syndicated from the United States Security Readiness Team (US-CERT). Link Removed - Invalid URL
  18. TA12-024A: "Anonymous" DDoS Activity

    "Anonymous" DDoS Activity Syndicated from the United States Security Readiness Team (US-CERT). Link Removed - Invalid URL
  19. TA12-024A: "Anonymous" DDoS Activity

    "Anonymous" DDoS Activity Syndicated from the United States Security Readiness Team (US-CERT). Link Removed - Invalid URL
  20. Windows 7 Facebook Launches Bug Bounty Program

    Facebook Launches Bug Bounty Program | threatpost