• Linux
  • By Silviu Stahie
  • October 1st, 2015
XOR DDoS Malware for Linux Attacks Have Been Greatly Exaggerated

XOR DDoS Malware for Linux Attacks Have Been Greatly Exaggerated

The truth about what this malware infects is different

Despite New Equipment, Rutgers University Goes Down After DDoS Attack

Despite New Equipment, Rutgers University Goes Down After DDoS Attack

As with previous attacks, hacker Exfocus is to blame

  • Security
  • By Catalin Cimpanu
  • September 29th, 2015
XOR DDoS Botnet Uses Compromised Linux Machines to Launch 150+ Gbps Attacks

XOR DDoS Botnet Uses Compromised Linux Machines to Launch 150+ Gbps Attacks

XOR DDoS botnet launches 150 Gbps attacks against Chinese targets

Anonymous Takes On Saudi Government over Teenager's Impending Execution <em>UPDATE</em>

Anonymous Takes On Saudi Government over Teenager's Impending Execution UPDATE

Anonymous tries a last ditch effort to convince the Saudi government to save Ali Mohammed al-Nimr's life

Mobile Ad Network Used in DDoS Attack

Mobile Ad Network Used in DDoS Attack

The attack originated in China and used Chinese mobile users

Kasidet DDOSing Bot Adds Credit Card Scraping Capabilities

Kasidet DDOSing Bot Adds Credit Card Scraping Capabilities

DDOS bot gets upgraded with PoS RAM scraping feature

Infographic: DDOS Attacks vs. the Online Gambling Industry

Infographic: DDOS Attacks vs. the Online Gambling Industry

Hackers have 40 billion reasons to target gambling sites

Hackers Used Imgur to Launch DDOS Attacks on 4chan

Hackers Used Imgur to Launch DDOS Attacks on 4chan

Malicious code injected in Imgur images used a Reddit thread to bombard 4chan servers with millions of requests

Kremlin Blames Recent DDOS on US Hackers

Kremlin Blames Recent DDOS on US Hackers

Hackers tried to alter Election Day data

  • Security
  • By Catalin Cimpanu
  • September 18th, 2015
New PoS Trojan Can Download Other Malware, Launch DDOS Attacks

New PoS Trojan Can Download Other Malware, Launch DDOS Attacks

Trojan.MWZLesson is one of the most sophisticated PoS malware strands ever found, mixes code from different malware

  • Security
  • By Catalin Cimpanu
  • September 17th, 2015
DDoS Attacks Used to Mask More Serious Intrusions

DDoS Attacks Used to Mask More Serious Intrusions

Most of the times it's malware infections and data breaches

  • Security
  • By Catalin Cimpanu
  • September 10th, 2015
DD4BC Hacker Group Blackmails Companies for Bitcoin Using DDOS Attacks

DD4BC Hacker Group Blackmails Companies for Bitcoin Using DDOS Attacks

The group required payments between 25 and 100 Bitcoin

Recent GitHub DDOS Linked to Chinese Government and Two GitHub Projects

Recent GitHub DDOS Linked to Chinese Government and Two GitHub Projects

China wanted two GitHub projects that circumvented the Great Chinese Firewall to be taken off the site

Infographic: How DDOS Attacks Work

Infographic: How DDOS Attacks Work

45% of all Web organizations are affected by DDOS attacks

DRDoS Attacks Can Now Propagate via BitTorrent Clients <em>UPDATE</em>

DRDoS Attacks Can Now Propagate via BitTorrent Clients UPDATE

BitTorrent, Vuze, and uTorrent clients are vulnerable

Dota 2 The International 2015 Tournament Delayed by DDOS Attack

Dota 2 The International 2015 Tournament Delayed by DDOS Attack

Games resume after 3 hours of waiting around

OurMine Graduates from Hacking Skype Accounts to DDOSing Financial Institutions

OurMine Graduates from Hacking Skype Accounts to DDOSing Financial Institutions

OurMine launches 117 Gbps DDOS on 9 financial institutions

 
Want more? Browse: