Security News > 2016 > November > Lessons From the Dyn DDoS Attack (Schneier on Security)
2016-11-08 12:25
A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS attacks are neither new nor sophisticated. The attacker sends a massive amount of traffic, causing the victim's system to slow to a crawl and eventually crash. There are more or less clever variants, but basically, it's...
News URL
https://www.schneier.com/blog/archives/2016/11/lessons_from_th_5.html
Related news
- CUPS vulnerabilities could be abused for DDoS attacks (source)
- Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Recently patched CUPS flaw can be used to amplify DDoS attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors (source)
- Largest Recorded DDoS Attack is 3.8 Tbps (source)
- New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks (source)