main

HacksSecurity

The Alpha, The Beta and The Omega: A Cyber Security Fairy Tale

June 9, 2016 — by Carl Herberger1

Omega.png

There once was a big, big, company who had many powerful subsidiary companies, some of which were acquired and some of which were part of the big, big company’s heritage product lines.

This big, big company made many meaningful products and services which were both adored and deeply needed by their many customers, and whose name was known to nearly all in the land.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksSecurity

Shooting From Behind the Fence

February 8, 2013 — by Eyal Benishti0

Can You Stay Anonymous While Participating in a DDoS Attack?
Taking part in a Hacktivist group is completely different than being part of a Botnet. In a Botnet, case participants are unknowingly “recruited” to an attack. In the Hacktivist group, case members take part in attack activities on their own accord.
Just this past month, Anonymous hackers in London were jailed for a series of DDoS attacks on PayPal and other payment services such as Visa and MasterCard.

Attack MitigationDDoS AttacksSecurity

Using Spreadsheets as a DDoS weapon

May 10, 2012 — by David Hobbs18

I saw an article the other day where somebody had used Google Docs incorrectly and he’d racked up a tremendous bill for himself because of the way he set up the hyperlinks. It got me thinking about the potential for hackers to really abuse this flaw in spreadsheets and hyperlinks to take web properties offline and cause financial pain.

So, the idea Anonymous or, say, an aggressive competitor could use against a target could be this:

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

Why Bother to Demonstrate in the Streets When You Can Simply Launch a Cyber-Attack on a Government Website

May 7, 2012 — by Ronen Kenig0

Not in favor of the new law that was just passed, immigration policies too racist, the Catholic Church too corrupt, it is possible or organize a demonstration or take the fastest, easiest and most effective way and launch a virtual attack on the offensive website. Take down the parliament portal to protest unfair laws or policies, shut down the local police’s website or the website of any offensive organization. Hacktivists have been very effective launching attacks on government websites and their motivation increases with each successful attack.

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

Operation Blackout Fails To Knockout!

April 2, 2012 — by Carl Herberger2

March 2012 – Radware’s ERT Busiest Month Ever

Operation Blackout Status:

If you read the press over the weekend, you would have been led to believe that most of Anon’s request for a virtual army fell on deaf ears. To be certain fewer soldiers materialized, and those who did participate were met with even less meaningful impact on their targets than previous efforts.

However, not all was lost. Of the virtual soldiers who decided to pick up their digital battle-axes, they provided enough energy for notable mayhem at a few of the world’s leading organizations.

Attack MitigationDDoS AttacksSecurity

Batten Down The Hatches: Anonymous – Coming Soon to Your Network

March 30, 2012 — by Dennis Usle0

As security professionals facing the rising tide of threats, many of us find ourselves researching and implementing next-generation perimeter defenses to mitigate risks.  Through analysis of threat vs. protection we quickly realize that no single protection will suffice; current risks require multiple protection layers to secure the business.

Typical intrusion prevention services (IPS) and next generation firewall (NGFW) devices claim coverage, but beware – they fall short.  In fact recent studies from Radware’s 2011 Global Application & Network Security Report show combined IPS and FW account for 32% of the common DDoS bottleneck.

Attack MitigationDDoS AttacksSecurity

Operation Blackout – Get Yourself Prepared

March 27, 2012 — by Ronen Kenig1

Operation Blackout due date is approaching: Anonymous is planning to shutdown the Internet on March 31st, 2012 by attacking all 13 DNS root servers.

DNS is a critical infrastructure of the Internet as every web transaction involves a DNS service that is provided by the internet service provider. A successful attack against DNS servers will result in halt of all Internet based services.

Attack MitigationBotnetsDDoS AttacksSecurity

Darkness (Optima) – DDoS for Hire

March 20, 2012 — by Yotam Ben-Ezra0

A clear trend in the security scene these days is the change in attacker profile. Computer hacking and DDoS attacks are no longer reserved for the small group of individuals who are familiar with the “bits and bytes” of underlying technologies. Today’s attackers may very well be ordinary computer users.

This is a result of an abundance of tools out there which do not require technical abilities surpassing the normal usage of a program, or simply the supplying of a credit card. A recent example is the Anonymous-OS which has been recently released. This is an Ubuntu- based OS which is pre-installed with all the necessary, and easy to use tools for the novice Anonymous member.