Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second

2022-06-15 - Cloudflare on Tuesday disclosed that it had acted to prevent a record-setting 26 million request per second (RPS) distributed denial-of-service (DDoS) attack last week, making it the largest HTTPS DDoS attack detected to date. The web performance and security company said the attack was directed against an unnamed customer website using its Free plan and emanated from a "powerful" botnet of

Source: Tweakers.net, Ravie Lakshmanan

What is the Essential Eight (And Why Non-Aussies Should Care)

2022-06-14 - In 2017, The Australian Cyber Security Center (ACSC) published a set of mitigation strategies that were designed to help organizations to protect themselves against cyber security incidents. These strategies, which became known as the Essential Eight, are designed specifically for use on Windows networks, although variations of these strategies are commonly applied to other platforms. What is

Source: Tweakers.net, The Hacker News

Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks

2022-06-14 - A Chinese advanced persistent threat (APT) known as Gallium has been observed using a previously undocumented remote access trojan in its espionage attacks targeting companies operating in Southeast Asia, Europe, and Africa. Called PingPull, the "difficult-to-detect" backdoor is notable for its use of the Internet Control Message Protocol (ICMP) for command-and-control (C2) communications,

Source: Tweakers.net, Ravie Lakshmanan

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"

2022-06-14 - A new covert Linux kernel rootkit named Syslogk has been spotted under development in the wild and cloaking a malicious payload that can be remotely commandeered by an adversary using a magic network traffic packet. "The Syslogk rootkit is heavily based on Adore-Ng but incorporates new functionalities making the user-mode application and the kernel rootkit hard to detect," Avast security

Source: Tweakers.net, Ravie Lakshmanan

Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware

2022-06-14 - Cybersecurity researchers have detailed the workings of a fully-featured malware loader dubbed PureCrypter that's being purchased by cyber criminals to deliver remote access trojans (RATs) and information stealers. "The loader is a .NET executable obfuscated with SmartAssembly and makes use of compression, encryption, and obfuscation to evade antivirus software products," Zscaler's Romain Dumont

Source: Tweakers.net, Ravie Lakshmanan

Ett stort företag börjar från små.
Grundades 2015
Hi,
let's talk about your project

Innehållet i detta e-postmeddelande är konfidentiellt och avsett endast för den mottagare som anges i meddelandet.