Home Search

Mirai - search results

If you're not happy with the results, please do another search

Defending Against the Mirai Botnet

When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel it. In a 31-day...

The Expansion of IoT since Mirai.

The idea of an Internet of Things (IoT) botnet is nothing new in our industry. In fact, the threat has been discussed for many...

Let’s discuss facts: An insight into Mirai’s source-code

In three massive DDoS attacks, Mirai botnet dazzled the cyber-security industry who long feared the implications of the exponentially growing number of devices connecting...

BusyBox Botnet Mirai – the warning we’ve all been waiting for?

On Tuesday, September 20th around 8:00PM, KrebsOnSecurity.com was the target of a record-breaking 620Gbps volumetric DDoS attack designed to take the site offline. A few days...
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had concluded that while the...

This was H1 2022: Part 2 – Cyber War

On February 24, 2022, news broke that Russia had initiated its special military operation against Ukraine. That date, which marked the start of the...
ddos

What Drives DDoS Attacks and Why it Should be a Concern

DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.
DDoS

2021 Year in Review: Denial of Service 

Going into 2022 that DDoS attacks will never disappear from the threat landscape. Attacks do not have to be complex to be effective. 
Threat Alert

Log4Shell: Critical log4j Vulnerability

The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library

Are Decade-Old DoS Tools Still Relevant in 2021?

Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services.