Posts Tagged With

DDoS

Current events
Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations
A running timeline of Anonymous Sudan’s DDoS attacks on countries, industries, companies, and governmental ...
Read post
Cyber Threat Intelligence
Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective
Well-known pro-Kremlin hactivist group Killnet has been noted for its level of activity and ambition, especially ...
Read post
Illicit communities
Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama
The apparent head of Anonymous Russia, an 18-year-old Belarusian citizen, was recently arrested by local ...
Read post
Cyber Threat Intelligence
What is DDoS and What are DDoS Attacks?
A tool favored by many threat actors, Distributed Denial-of-Service (DDoS) attacks seek to make a targeted ...
Read post
Cyber Threat Intelligence
Flashpoint Year In Review: 2022 Breaches and Malware Threat Landscape
Mostly motivated by greed, threat actors will target any organization regardless of sector. Therefore, data ...
Read post
Cyber Threat Intelligence
Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More
The video game industry has grown considerably since its introduction in the early 1970s, with analysts believing ...
Read post
Cyber Threat Intelligence
Definitive Guide to Ransomware: What It Is and How Your Organization Can Prevent, Detect, and Respond to a Ransomware Attack
A guide to defining, explaining, and understanding ransomware to bolster your organizations security posture ...
Read post
Cyber Threat Intelligence
From Ransomware to DDoS: Guide to Cyber Threat Actors—How, Why, and Who Threat Actors Choose to Attack
Threat actors who execute cyberattacks, such as ransomware, can wreak havoc on organizations across the private ...
Read post
Cyber threat intelligence
The Flashpoint Guide to Card Fraud: How Financial Institutions Can Better Detect, Mitigate, and Prevent Fraud
Card Fraud, or carding, describes the process by which threat actors gain access to, and then leverage, stolen ...
Read post
Vulnerability management
Threat-Actor Opportunism at Peak During Holiday Season
Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, ...
Read post
Cyber Threat Intelligence
Cyber Jihadists Dabble in DDoS: Assessing the Threat
Recent events suggest that while cyber jihadists appear to remain of low skill and under-sophisticated, their ...
Read post
Cyber threat intelligence
An After-Action Analysis of the Mirai Botnet Attacks on Dyn
Digging into the recent series of distributed denial-of-service (DDoS) attacks against Dyn DNS, which impacted ...
Read post