An Inventory of What Was Taken in the Staminus Data Breach

An Inventory of What Was Taken in the Staminus Data Breach

Over 4,400 customer details, 2,042 credit card details taken

Hackers Breach DDoS Protection Firm Staminus

Hackers Breach DDoS Protection Firm Staminus

KKK website data also stolen in the attack

  • Security
  • By Catalin Cimpanu
  • February 10th, 2016
Malware Distributors Use Fake CloudFlare DDoS Checks to Trick Users

Malware Distributors Use Fake CloudFlare DDoS Checks to Trick Users

Fake DDoS protection system actually sends users to an EK

  • Security
  • By Catalin Cimpanu
  • January 11th, 2016
US DHS Just Spent $1.7 Million to Develop Better DDoS Protection Tech

US DHS Just Spent $1.7 Million to Develop Better DDoS Protection Tech

New 3DCoP tech uses P2P and virtual networks to mitigate DDoS attacks by detecting and stopping traffic patterns

  • Security
  • By Catalin Cimpanu
  • October 10th, 2015
DDoS Attacks Can Bypass Mitigation Services by Taking Aim at a Website's Origin IP

DDoS Attacks Can Bypass Mitigation Services by Taking Aim at a Website's Origin IP

Attackers can obtain a site's origin IP in 71.5% of cases