Security
Headlines
HeadlinesLatestCVEs

Tag

#ddos

Thinking of Hiring or Running a Booter Service? Think Again.

Most people who operate DDoS-for-hire services attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the feds: It was minimizing harassment from unhappy customers or victims, and insulating themselves against incessant attacks from competing DDoS-for-hire services. And then there are booter store operators like John Dobbs, a 32-year-old computer science graduate student living in Honolulu, Hawaii. For at least a decade until late last year, Dobbs openly operated IPStresser[.]com, a popular and powerful attack-for-hire service that he registered with the state of Hawaii using his real name and address. Likewise, the domain was registered in Dobbs’s name and hometown in Pennsylvania. The only work experience Dobbs listed on his resum...

Krebs on Security
#web#ddos#git#perl#auth#blog
Hacktivists Leak 1.7TB of Cellebrite, 103GB of MSAB Data

By Waqas The data is now available for download on DDoSecrets and the official website Enlace Hacktivista. This is a post from HackRead.com Read the original post: Hacktivists Leak 1.7TB of Cellebrite, 103GB of MSAB Data

GitHub Disables Pages of Pro-Russia DDoS Group NoName057(16)

By Deeba Ahmed NoName057(16) is a group that has been targeting NATO and Czech presidential election candidates' websites recently. This is a post from HackRead.com Read the original post: GitHub Disables Pages of Pro-Russia DDoS Group NoName057(16)

CVE-2023-22410

A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS on MX Series platforms with MPC10/MPC11 line cards, allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). Devices are only vulnerable when the Suspicious Control Flow Detection (scfd) feature is enabled. Upon enabling this specific feature, an attacker sending specific traffic is causing memory to be allocated dynamically and it is not freed. Memory is not freed even after deactivating this feature. Sustained processing of such traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. The FPC memory usage can be monitored using the CLI command "show chassis fpc". On running the above command, the memory of AftDdosScfdFlow can be observed to detect the memory leak. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 20.2R3-S5; 20.3 versi...

Researchers Find 'Digital Crime Haven' While Investigating Magecart Activity

A security vendor's investigation of infrastructure associated with a new, crypto-focused Magecart skimmer leads to discovery of cryptoscam sites, malware distribution marketplace, Bitcoin mixers, and more.

Big Prizes, Cash on Offer for Joining 'DDosia' Anti-Ukraine Cyberattack Project

Russia's NoName057(16) group offers incentives and prizes via Telegram channel for "heroes" to mount attacks against targets within Ukraine and pro-Ukrainian countries.

DDoS Attacks Hit Denmark Central Bank and 7 Private Banks

By Habiba Rashid Along with the websites of the central bank, Bankdata—a company that develops IT solutions for the financial industry—was also targeted by a DDoS attack. This is a post from HackRead.com Read the original post: DDoS Attacks Hit Denmark Central Bank and 7 Private Banks

Microsoft: Kinsing Targets Kubernetes via Containers, PostgreSQL

The cryptomining malware, which typically targets Linux, is exploiting weaknesses in an open source container tool for initial access to cloud environments.

65% of Organizations Plan to Adopt a Security Service Edge Platform in Next 2 Years: Axis Security

2023 Security Service Edge (SSE) Adoption Report finds that SSE technology addresses key pain points including much-needed solution consolidation, transition to hybrid work and need for hardened security.

Serbia Slammed With DDoS Attacks

The Serbian government reports that it staved off five attacks aimed at crippling Serbian infrastructure.