gridinsoft-logo
  • Products
    • Anti-Malware
    • Trojan Killer [Portable Edition]
    • Trojan Scanner [Android Edition]
    • Comparison
  • Our Team
    • Find a Job
    • COURSES FOR DEVELOPERS
  • Resources
    • Tech News & Security Tips
    • Learn About Cybersecurity
    • Reviews
    • Help Center
    • Release History
  • Contacts
  • | Member Area |
  • DOWNLOAD NOW
  • CN
  • UA
Skip to content
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs
Logo

Tag: DDoS

  • Tips & Tricks

What is a Smurf Attack? How Does It Work?

imageByStephanie AdlamMay 4, 2022
What is a Smurf Attack? How Does It Work?
Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most sophisticated types of denial attacks. Let’s check how that works, and figure out how to mirror that attack as well as

Read More

  • Security News

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

imageByVladimir KrasnogolovyMay 1, 2022
Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites
Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was hit by large-scale DDoS attacks. CERT-UA has published a report on ongoing DDoS attacks on Ukrainian websites and a government web portal. Unknown attackers compromise WordPress sites and inject

Read More

  • Security News

Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times

imageByVladimir KrasnogolovyMarch 14, 2022
Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times
This week, Akamai experts discovered a unique DDoS amplification vector that can achieve a 4.3 billion to one attack repelling or amplification ratio. The new attack vector is based on the abuse of unprotected Mitel MiCollab and MiVoice Business Express systems, which act as

Read More

  • Security News

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

imageByVladimir KrasnogolovyMarch 31, 2021
Akamai Says Powerful DDoS Attacks Are Becoming the Norm
According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming the norm. Although they fall short of past records (recall last year’s 2.54 TB/sec attack or 1.35 TB/sec attack in 2018), it’s still a big problem. The fact is that three

Read More

  • Security News

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

imageByVladimir KrasnogolovyMarch 30, 2021
Hackers attack Microsoft Exchange servers on behalf of Brian Krebs
The well-known information security expert, journalist and author of the KrebsOnSecurity blog has repeatedly become a target for attacks and mockery of hackers. Now hackers are attack Microsoft Exchange servers with Proxylogon vulnerabilities on behalf of Brian Krebs. The

Read More

  • Security News

Attackers using DCCP protocol for DDoS attacks

imageByVladimir KrasnogolovyMarch 24, 2021
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP network protocol (Datagram Congestion Control Protocol) for DDoS attacks. This internet standard was approved in 2007 and helps monitoring network congestion for UDP-based communications. DCCP is especially

Read More

  • Security News

DTLS can amplify DDoS by 37 times

imageByVladimir KrasnogolovyMarch 18, 2021
DTLS can amplify DDoS by 37 times
Netscout warns that using of the DTLS vector allows hackers to amplify DDoS attacks by 37 times. The researchers found that criminals are using a relatively new vector for amplifying DDoS attacks: the Datagram Transport Layer Security (DTLS) protocol, which provides

Read More

  • Security News

REvil spokesman boasts that hackers have access to ballistic missile launch systems

imageByVladimir KrasnogolovyMarch 17, 2021
REvil spokesman boasts that hackers have access to ballistic missile launch systems
A Revil representative under the pseudonym Unknown, claims that the hackers, partners in the use of malware, have access to ballistic missile launch systems. Cybercriminal group REvil operates on the RaaS ransomware-as-a-service business model, in which attackers offer

Read More

  • Security News

Google revealed the most powerful DDoS attack in history

imageByVladimir KrasnogolovyOctober 17, 2020
Google revealed the most powerful DDoS attack in history
This week, the Google Cloud team talked about a previously unknown DDoS attack that targeted a Google service back in September 2017 and peaked at 2.54 TB/sec, making it the most powerful recorded attack in history. Soon, analysts from the Google Threat Analysis Group (TAG)

Read More

  • Security News

Lucifer malware uses many exploits, is engaged in mining and DDoS attacks

imageByVladimir KrasnogolovyJune 29, 2020
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, “wreaks havoc” on Windows hosts. It is noted that the authors of the malware themselves named their brainchild Satan DDoS, but information

Read More

Posts navigation

Page 1 Page 2 NextNext page

Trending Articles

How To Reset Browser Settings?

June 23, 2018

How To Send System Information For Analysis

June 23, 2018

How To restore quarantined files?

June 15, 2018

Image
Use Strong Passwords to Can’t be Hacked Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses How annoying these messages are! My mailbox is flooded with these nasty offers, and I sometimes struggle to understand if the message is normal or spam!. Can I solve that?

Our Products:

  • Anti-Malware
  • Trojan Killer Portable
  • Android Trojan Scanner

Member Area:

  • Sign In

Solutions:

  • Spyware Remover
  • Ransomware Protection Tool
  • Virus Scanner & Removal Tool
  • Trojan Scanner & Removal Tool
  • Adware Removal Tool

Cybersecurity:

  • Spyware
  • Malware
  • Ransomware
  • Hacking
  • Darknet
  • Exploits
  • Antivirus
  • Adware
  • Backdoor
  • Botnet
  • Data Breaches
  • DDoS
  • Phishing
  • Trojan
Footer Logo
  • Terms of Use
  • Privacy Policy
  • How to Uninstall
  • How we use your data
Copyright © Gridinsoft LLC
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs

Latest Articles

  • Information Security Specialist Showed How to Steal a Tesla CarMay 19, 2022
  • Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT MalwareMay 18, 2022
  • Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM RelayMay 17, 2022
  • What Is Internet Protocol: IP Address DefinitionMay 16, 2022
  • What is SSL Certificate?May 16, 2022