Mirai-based DDoS Attackers Aggressively Adopted New Router Exploits
In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign. This campaign, known for its aggressive tactics, had...
BIND DNS System Flaws Let Attackers Launch DoS Attacks
In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two critical security flaws, labeled...
Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services
Sophisticated DDoS attacks have become a favored tool for hackers, enabling them to target not only large organizations but also individuals.This means that...
ZYXEL Buffer Overflow vulnerability Let Attacker Launch DoS Attack
ZYXEL has been discovered with a Buffer Overflow vulnerability on their ZYXEL-PMG2005-T20B device, which can result in a denial-of-service condition. This condition exists due...
Cisco Nexus 3000 and 9000 Series Switches Flaw Let Attackers Trigger DoS Attack
A Denial-of-Service vulnerability has been discovered in the Cisco Nexus 3000 and 9000 series switches, which could allow a threat actor to cause a...
Pro-Russian Actors Initiated A DDoS Attack Against Canadian Organizations
The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks.This criminal activity is linked...
Case Study: Blocking Botnet-Driven Low-Rate HTTP DDoS Attacks
Indusface research on 1400+ websites recorded a significant surge in DDoS attacks and bot attacks during Q2, 2023, compared to Q1, 2023. We observed...
Largest DDoS Attack Ever – 659.6 Million Packets Per Second
In the past few weeks, an organization in Eastern Europe has been the victim of the biggest DDoS attack that the continent has ever...
Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets
The trend of Cybercrime-as-a-Service continues to evolve in dark web forums, a new DDoS-for-Hire service spotted by FortiGuard Labs team that allows a novice...
Similarities and Difference Between Ransomware and DDoS Extortion Attacks
Cybercriminals leverage multiple methods to bring financial gain. Most of the ways are based on infiltrating an organization's network and gaining unauthenticated access, which...