Search

Showing 84 results for: "Blackhole".

Leverage AI to stay ahead of the attackers
Today, there many discussions within the security community about how IT professionals leverage artificial intelligence (AI) to make products smarter and faster. Companies now use AI to address security challenges at a rapid pace, with a 36% increase in spend on generative AI al...
Healthcare websites flooded by fake requests in ongoing DDoS attacks
In addition to the ongoing targeting by Killnet, healthcare entities are facing another DDoS campaign flooding targeted networks and servers with fake DNS requests for non-existent domains, or NXDOMAINs. The latest Department of Health and Human Services Cybersecurity Coordination Center alert w...
Cisco products affected by various L2 network security control bugs
Numerous Cisco enterprise routers and switches have been confirmed to be affected by four medium-severity Layer-2 network security control bypass vulnerabilities, SecurityWeek reports. Threat actors could exploit the flaws, tracked as CVE-2021-27853, CVE-2021-27854, CVE-2021-27861 and CVE-2021-2786...
'Bulletproof hosting' providers for cybercriminals sentenced
Estonian national Pavel Stassi and Lithuanian national Aleksandr Skorodumov have been sentenced to 24 months and 48 months imprisonment, respectively, after entering a guilty plea to a count of RICO conspiracy each tied to their participation in offering "bulletproof hosting" to cybercriminals, repo...
Evolving DDoS security toward self-defending networks
A new era of Distributed Denial of Service (DDoS) attacks has arrived. In 2018 DDoS attacks broke the terabit barrier, and have become even more frequent and sophisticated (or vicious) as they now commonly combine several different attack techniques that vary — both in time and geographically —...
Complexity of DDoS attacks is rising says new report
More than half - 59 percent - of service providers and 48 percent of enterprises experienced multi-vector attacks, a 20 percent increase over last year. Multi-vector attacks combine high volume floods, application-layer attacks and TCP-state exhaustion attacks in a single sustained offensive, increa...
Security Weekly #473 - Tech Segment: DNS Blackhole Server with Python
Joff will write a Python script that can download malware domain name lists from a URL, and create a DNS blackhole bind9 based configuration file on the domain names obtained. Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http://tra...
Cisco Talos ties Angler disappearance to Russian arrests
Researchers at Cisco Talos believe the disappearance of the Angler exploit kit (EK) from the threat landscape may be a long-term situation and that its absence is most likely tied to the take down of a Russian gang by law enforcement in early June. Talos blogger Nick Biasini tied together about a do...
Dyre Trojan almost dead after 'takedown' by the Russians
Symantec confirmed yesterday that all spam campaigns spreading Dyre stopped suddenly on 18 November and have not re-started since. Infection rates involving Dyre – which has plagued the customers of over 1000 mainly UK and US banks and other companies – have dropped dramatically since November, from...

You can skip this ad in 5 seconds