Security News > 2016 > October > Dyn DDoS attack post-mortem: Users inadvertently helped (Help Net Security)
As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service attacks” on their DNS system, Dyn has published a short post-mortem of the unprecedented DDoS attacks it suffered on Friday (October 21, 2016). The Dyn DDoS attacks Scott Hilton, EVP of Product at Dyn, confirmed that a Mirai botnet was the primary source of the malicious attack traffic. But the initial … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/jsk9i7P8qk8/
Related news
- CUPS vulnerabilities could be abused for DDoS attacks (source)
- Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Recently patched CUPS flaw can be used to amplify DDoS attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors (source)
- Largest Recorded DDoS Attack is 3.8 Tbps (source)
- New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks (source)