If your business has an online presence or internet-facing network infrastructure, you really need to understand the significant threat posed by DDoS attacks today and put measures in place now to mitigate them.
Cyber-security executives and business decision makers question whether phishing emails or ransomware attacks are the most potent threats faced, but are businesses equipped to implement all-round risk mitigation strategies?
UK police tried DDoS style attacks to disrupt service on suspected drug dealer's phones in cases where they couldn't prosecute but were looking to interfere with the drug trade.
A Chinese drive-by attack was recently observed dropping an updated version of the Avzhan DDoS bot, according to Malwarebytes researchers.
DDoS threat actors have started to exploit a known problem with unsecured Memcache servers to launch hugely powerful attacks with little in the way of resource investment required.
First in-the-wild DDOS IPV6 attack hits servers, with portents of more to come. The DNS dictionary attack originated from around 1,900 different native IPv6 hosts, on more than 650 different networks.
Using a piecemeal "set and forget" approach to maintaining your DNS security puts your business at risk of cyber-attack. It is akin to closing the vault door, but not checking that it has actually been locked!
Late last year SC Media UK finally met someone confident that their organisation is GDPR compliant, ready for the new regulations coming into force in May: Stephen Schmidt, CISO, Amazon Web Services (AWS).
A series of cyber-campaigns, jointly known as the Hex-Men Trio, that specifically target SQL Servers in order to use them to conduct additional attacks has been identified by Guardicore Labs.
Given the volumes of cash swashing around, it's no surprise that leisure and gaming industries have become a target for cyber-crime; new reports suggest there is growing interest on the Dark Web in attacks on the gaming industry.
IoT devices in the dock as DDoS stages a resurgence, but stealth and sophistication also on the rise.
Highly destructive, self-learning 'swarmbots' driven by hivenets will be the threat trend for next year said Fortinet global security strategist, Derek Manky, speaking at the vendors International Media Conference in Nice this week.
Trustwave researchers revealed a vulnerability in Brother consumer and business printers and multi-function devices that can allow a denial of service attack. Brother UK responds.
News Feature: Interview with ex-GCHQ director Robert Hannigan CMG; tech leaders on the board; terrorists to achieve ability to wreak cyber-chaos in 5 years; DDoS as smokescreen/DDoS Awareness Day; active cyber-defence.
The Sockbot malware has made its way into at least eight Apps in the Google Play Store with the intent of adding devices to botnets and performing DDoS attacks.
A series of distributed of denial of service attacks aimed at Sweden's transportation services caused train delays and disrupted over travel service earlier this week.
Newly published research suggests that while there has been a marked increase in spending to mitigate against Distributed Denial of Service (DDoS) attacks, organisations are still falling victim.
According to Darren Anstee, the Internet of Things (IoT) brings many capabilities both good and bad - but from a Distributed Denial of Service (DDoS) perspective it has provided attackers with a new, highly numerous population of devices to compromise.
KB Kookmin Bank, Shinhan Bank, Woori Bank, KEB Hana Bank, NH Bank and two other South Korean banks were reportedly threatened with DDoS attacks last week.
The noise created by distributed denial of service attacks is higher than ever - with vendors and attackers complicating the picture - but what do enterprises need to worry about?
Old Wimax routers have been found to contain backdoors and could enable hackers to bypass authentication researchers have now disclosed, aiding use for DDoS attacks.
During Q1 2017, a reduction in average DDoS attack duration was witnessed, thanks to the prevalence of botnet-for-hire services that commonly used short, low-volume bursts.
IBM's X-Force Research Team has found that cyber-criminals follow Willie Sutton's old-school, analog advice on why to rob banks because "that is where the money is."
The Hajime malware has recruited 300,000 IoT devices to its botnet, but researchers are still baffled as to what the botnet 's purpose may be.
In Case You Missed It: Skype flaw Spyke; Nomx claims nixed; Linux law refuted? Locky's return; LDAP DDoS vector
Hackers use misconfigured LDAP servers - Connectionless Lightweight Directory Access Protocol (CLDAP) - to provide a means to launch DDoS attacks.
Alan Mudd was sentenced to two years in a young offender's institution by a UK court for creating, selling and using Distributed Denial of Service malware.