HTTP/2 Continuation Attack

HTTP/2 Continuation Flood Attack : Single Machine Can Bring Down Server

Security researcher Bartek Nowotarski disclosed a new class of vulnerabilities within the HTTP/2 protocol, known as the HTTP/2 CONTINUATION Flood. This attack vector is proving to be a significant threat, potentially more dangerous than...
CISA & FBI Released Guide to Respond for DDoS Attacks

CISA & FBI Released Guide to Respond for DDoS Attacks

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has released a comprehensive guide. It aimed at assisting federal,...
167,500 Instances Found Vulnerable to Loop DoS Attack

167,500 Instances Found Vulnerable to Loop DoS Attack

A sweeping vulnerability has been uncovered, leaving an estimated 167,500 instances across various networks susceptible to a Loop Denial of Service (DoS) attack. This discovery underscores the ever-present and evolving threats in the digital...
New Application-Layer Loop DoS Attack: Impacts 300,000 Online Systems

New Application-Layer Loop DoS Attack: Impacts 300,000 Online Systems

Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide. This novel attack, which targets the application layer of network communication, has raised significant concerns...
Project DDoSia – Russian Hacker Groups ” NoName057(16)” Planning To Conduct Massive DDoS Attack

Project DDoSia – Russian Hackers “NoName057(16)” Planning Massive DDoS Attack

The Russia-Ukraine war has provoked several threat groups who were identified as "nationalist hactivists" that targeted most of the NATO member states with multiple attack vectors. One of the most notable ones was the...
Hackers Advertising COVID Botnet Can bypass anti-DDoS systems

Hackers Advertising COVID Botnet Can bypass Anti-DDoS Systems

A new botnet named "COVID BOTNET" is being advertised on the dark web, claiming to target NATO servers and the broader Western digital infrastructure. The creators of this botnet are boasting about its ability...
Best DDoS Protection Tools

Top 10 Best DDoS Protection Tools & Services – 2024

A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to interrupt the regular traffic of a targeted server, service, or network by flooding the target or the area around it with Internet traffic. HTTP DDoS...
The Rise of DDoS Attacks in Q3, 2023: Are You Prepared?

The Rise of DDoS Attacks in Q3, 2023: Are You Prepared?

The Indusface AppSec Q3, 2023 Report reveals a staggering 67% surge in DDoS attacks compared to the previous quarter, highlighting a concerning trend with profound impacts on various industries. Over 41% of websites have shown...
Hackers Exploiting 0-day RCE Flaws in the Wild to Deploy Mirai Malware

Hackers Exploiting 0-day RCE Flaws in the Wild to Deploy Mirai Malware

The Mirai botnet is a malicious network of infected computers, routers, and IoT devices harnessed by cybercriminals to launch large-scale DDoS attacks.  The destructiveness of Mirai lies in its ability to compromise and control a...
Cloudflare Observed The Peak DDOS Attack of 201 Million HTTP Requests Per Second 

Cloudflare Observed The Peak DDOS Attack of 201 Million HTTP Requests Per Second 

DDoS (Distributed Denial of Service) attacks are extremely destructive and alarming since they flood a target's web services with overwhelming traffic. This can disrupt or even completely disable:- Websites Servers Networks This can cause significant financial losses, damage to...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...