Increasingly, cybersecurity incidents are affecting thousands, or even millions, of members of the gamer community. According to experts in ethical hacking, this...
Under “usual circumstances,” AWS makes headlines for exposing databases of companies using its services. A few days ago (Oct 22, 2019), the...
According to digital forensics specialists, Amazon Web Services (AWS), the technology giant’s cloud computing services division, has been the victim of a...
CPDoS can be used to attack content delivery networks (CDNs) to serve error pages instead of legitimate sites through caching. Freshly termed...
Cisco released new security updates for multiple software products such as Cisco ASA, FMC, and FTD Software that affects 18 vulnerabilities in...
Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller...
Cyberattacks have always surprised security experts because they are sneaky and come in different forms. Distributed Denial of Service is a process...
It seems that companies will never stop being inconvenienced by some security flaws. Vulnerability testing experts report that Cisco has extended the...
According to ethical hacking specialists, over the past weekend multiple Wikipedia sites for some regions of Europe and the Middle East experienced...
Wikipedia Hacked: cybercriminals have launched a massive DDOS attack on Wikipedia and take down the website in several countries in Europe and parts...
The DDoS attack on Wikipedia is first of its kind. The popular online encyclopedia Wikipedia has suffered a DDoS attack over the...
The prime suspect of the DDoS attack is China. An online forum used by activists behind the ongoing Hong Kong protests has...
A new multistage attack exploiting Elasticsearch servers using the old unpatched vulnerability to invoke a shell with a crafted query and encoded...
An unrevealed streaming site hit with massive DDoS attack from 402,000 different IoT(Internet of Things) Botnet IPs, which directed a peak flow...
The malware attack involves two stages including one in which existing cryptomining malware is removed. The IT security researchers at Trend Micro...
UFONet is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS attacks, using ‘Open Redirect’ vectors, generally located on third part-y...
A new Mirai variant dubbed Miori uses text-based protocols to establish communication with command-and-control (C&C) servers. The Miori campaign was identified in...
The cybercriminal was also involved in several other cybercrimes including swatting and deleting databases of targeted websites. Austin Thompson, a DDoS attacker...
The Tor Project is finally going to release a fix for a bug that has been plaguing Onion sites for years, making...
This week, Austin Thompson, a 23-year-old from Utah, US, was sentenced to two years and three months in prison after being charged...
In one of its kind acts, a Utah-based man named Austin Thompson (23) is going to prison for launching DDoS attacks on...