20 Dangerous Types of Cybersecurity Threats
The cybersecurity threats in this year are more considerable than ever. Due…
Russian Aviation agency switched to paper documents due to a hacker attack
The media, citing their own sources, report that at the end of…
Akamai Researchers Say DDoS Attacks Amplification for 4 Billion Times
This week, Akamai experts discovered a unique DDoS amplification vector that can…
TeamTNT mining botnet infected over 50,000 systems in three months
Trend Micro warns that since March 2021, the TeamTNT mining botnet from…
Hackers attack Microsoft Exchange servers on behalf of Brian Krebs
The well-known information security expert, journalist and author of the KrebsOnSecurity blog…
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP network protocol…
DTLS can amplify DDoS by 37 times
Netscout warns that using of the DTLS vector allows hackers to amplify…
REvil spokesman boasts that hackers have access to ballistic missile launch systems
A Revil representative under the pseudonym Unknown, claims that the hackers, partners…
Google revealed the most powerful DDoS attack in history
This week, the Google Cloud team talked about a previously unknown DDoS…
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer malware, which…
The Danger of Botnet Network: How to Detect Botnet on You PC
The word "botnet" is now ubiquitous, and almost all users know what…