What is NFT? Everything about NFT

First, let’s see what is Cryptocurrency ? A cryptocurrency is a new form of digital money. You can transfer your traditional, non-crypto currency money like the U.S. dollar digitally, but that’s not quite the same as how cryptocurrencies work. When cryptocurrencies become mainstream, you may be able to use them to pay for stuff electronically, […]

Fears for Banks :Cyber Attacks Ranking High in 2015

Banking increasingly felt the sting of cyber attacks in 2015, after what was a hard year of DDoS and breaches against conpanies globally. From Finland, to Sweden, to Greece, to the US, cyber threats are becoming the new liability to plague the industry. In a report conducted by the Cyber Security Forum Initiative and PricewaterhouseCoopers, […]

New amplification methods : RIP AND PORTMAP

To catch up on the latest amplification methods I decided to write this post to give a short review for them. RIP amplification method is a shortcutNew amplification methods : RIP AND PORTMAP for the Routing Information Protocol which is a UDP service working on port 520. Its amplification rate is pretty decent at about […]

DDoS, Baidu, and China’s Great Cannon

Recently the New York Times announced that CloudFlare has partnered with Internet search giant Baidu in China, Google’s eerily similar competitor, to deliver Yunjiasu, a CloudFlare-like service in China. The service is aimed at speeding up Internet connectivity and providing some level security services for its customers, including limited DDoS mitigation. It will likely operate similar to CloudFlare itself, with […]

Free Cloud Services and How They Are Used for DDoS

Free cloud services have become popular in recent years. These services provide developers a platform to test software, and collaborate with others easily. While this sounds amazing, in reality these platforms can be a goldmine for attackers if not properly secured. Many of these services require only an email for verification. Setting up fake emails […]

DYLD: The New Apple Zero Day Exploit

According to TechNewsWorld, “Malwarebytes has discovered a new zero day exploit in OS X that lets apps bypass passwords during installation to get root permission through a Unix shell.” The exploit installs an application that allows “anything to be installed anywhere”. There was a time when Mac users were a small contingent on the Internet […]

ddos amplifier

A History Lesson: Apple’s Patented Method for Amplifying DDoS

In late-1999, Apple was granted US Patent No 5,931,961 for Discovery of acceptable packet size using ICMP echo.  A form of this mechanism was implemented in Mac OS 9 and was soon misused as a means of amplifying DDoS attacks .  This patent is widely-cited by inventors at other Internet giants, but the mistake in its method […]

Tunneling Traffic Through DNS to Bypass Firewalls

Monitoring and analyzing your network traffic is more of an art form than a science: every network is unique. The differences appear in the services we run, the types of traffic we generate, as well as our network design and layout. In order to properly analyze traffic dumps, we must first know what kind of […]

Webair CTO Presents Multi-Layer DDoS Mitigation Strategies

In a recent presentation to LinuxCon attendees, Webair CTO Sagi Brody and Senior Infrastructure Engineer Logan Best discussed the current dynamics of DDoS attacks and mitigation methods, and we’re pleased to have been included and provide some statistics for them. Beginning from the target server all the way to 3rd party protection, Brody describes ways […]

Staminus Chooses Advania As Its Official DDoS Partner in Iceland

Staminus has teamed up with the multi-service IT company Advania to defend their Iceland-based clients. With 70 years of experience in the field of technology services, Advania is the largest business of its kind in Iceland, and was the ideal partner to help establish a quality defense against Distributed Denial-of-Service (DDoS) attacks in the country. […]

The 5000 Pound iPhone: Your Smart Car

Everyone wants to be the new next best thing.  We hear quite often about the “iPhone killer”, but that has not occurred to date.  There is also an understanding that all new technology comes with security risks (which is how so many devices end up as DDoS sources).  So it’s becoming real interesting to watch the automotive industry […]

Responding to advanced threats with a SIEM is like playing ‘Where’s Waldo’ with your Network

When alerts get escalated, what’s your go-to solution to validate and track the threat? When monitoring a recognized breach to see what happens next, what do you rely on to make sure you see the attacker’s every move throughout your network? If you’re like most enterprises, you were sold a bill of goods with Security […]