HackDig : Dig high-quality web security articles for hacker

‘It’s the End of DDoS as You Know it’

The past weeks have seen a number of cybercriminal events that are noteworthy in that they give us a glimpse of where cybercrime in general and DDoS attacks in particular are heading. In this post we take a look at the forces driving DDoS attacks, put recent events in perspective, and assist in understanding what can be done about them. The same way dynamit
Publish At:2016-10-11 00:30 | Read:4048 | Comments:0 | Tags:cybercrime DDoS Security General Updates bandwidth Cyber Cri

Note to Banks: Proactively validate your DDoS mitigation

Banks around the world are in the cross fire of the hacktivist group Anonymous who launched campaign Op-Icarus (#OPIcarus), against global financial institutions. Anonymous wants to bring public attention to what they call ‘corruption’ inside the financial industry. The first victims of Op-Icarus were Bank of Greece, and Bank of Cyprus both of wh
Publish At:2016-05-09 10:35 | Read:2581 | Comments:0 | Tags:Cyber Security Assesment DDoS Security bank banks Cyber Secu

40,000 Reasons to Test Your DDoS Mitigation Posture

Any thoracic surgeon will tell you that implanting a pacemaker is never complete before its settings have been thoroughly validated. A patient is only discharged from hospital once the pacemaker’s configurations have been optimized for the patient’s comfort and physical security. Discharging a patient without validating the pacemaker’s settings is unthinkabl
Publish At:2015-11-03 19:15 | Read:3267 | Comments:0 | Tags:Cyber Security Assesment DDoS Security ddos mitigaiton ddos

DDoS Extortion – Biting the DDoS Bullet

It started with a five minute long DDoS attack which established that the cybercriminals meant business and could cause impact, this small sample attack stopped all business for five minutes. They then sent an email demanding payment of the ransom in bitcoins within 48 hours, otherwise a second and far more damaging DDoS attack would ensue and the ransom amo
Publish At:2015-08-11 02:45 | Read:3118 | Comments:0 | Tags:Cyber Security Assesment DDoS Security DDoS DDoS Analysis DD

Lessons learned from a day of DDoS Testing

  Coming from the sales side, I wanted to spend more time learning how our customers experience DDoS testing, and what aspects of it they find most valuable? So I spent a day with our tech team onsite. The customer we were testing had just invested in a mitigation system and wanted to know whether the investment lives up to the promise in case they were
Publish At:2015-06-02 10:30 | Read:2506 | Comments:0 | Tags:DDoS Security Cyber Security DDoS DDoS mitigation DDoS testi

NTPD DDoS Attack Analysis

  Overview   With all the recent hype on “NTP DDoS” attacks, I took some time to understand why this attack became so popular. After researching the attack and the viability of the attack from the attacker’s perspective, I saw quickly why this vector is becoming the new “DNS” DDoS attack. Simply put, it’s extremely easy to cultivate and
Publish At:2014-08-10 17:20 | Read:2688 | Comments:0 | Tags:DDoS Security Attack simulation DDoS Analysis DDoS Attacks n

The new age Of – Cyber Security Threat Assessment “DDoS Testing” vs “Penetration testing”

Introduction I have addressed with brevity pentesting in this article and mainly focused on “DDoS testing”. The reason being, I believe pentesting is a well known concept for security personnel and management in most organizations. “DDoS testing” is a relatively new concept for many people. I’ve attempted on a macro level to give insight into the differences
Publish At:2014-08-10 17:20 | Read:3039 | Comments:0 | Tags:Cyber Security Assesment DDoS Security DDoS Analysis DDoS AP


Share high-quality web security related articles with you:)


Tag Cloud