1.0Â Â Milestones 1.1Â Â DDoS Size Expansion IP data source: The Zettabyte Era: Trends and Analysis The past decade has witnessed a steady growth in the peak size of DDoS attacks, especially in 2013 when the reflection method was used by attackers on a large scale and the DDoS attack size...
Year: 2019
What You Should Know About Mitigation Bypass
Mitigation measures are implemented with many implicit assumptions. They can work only when these assumptions prove to be true and would be bypassed if these assumptions were broken. (more…)
IP Reputation Report-06242019
1. Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at June 21, 2019. Top 10 countries in attack percentage: The Laos is in the first place since four weeks ago. The...
Botnet Trend Report-2
Botnets have evolved since 2017. New active families and platforms have become dominant. Attack types used have also changed. (more…)
Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert
Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel, namely, a SACK Panic vulnerability of important severity and two other vulnerabilities of moderate severity. (more…)
TP-Link Wi-Fi Extenders Remote Code Execution Vulnerability (CVE-2019-7406) Threat Alert
Overview Recently, a security expert from IBM X-Force discovered a remote code execution vulnerability (CVE-2019-7406) in multiple models of TP-Link Wi-Fi extenders. This vulnerability can be exploited by unauthenticated, remote attackers by sending a malformed HTTP request so as to execute arbitrary shell commands on a target Wi-Fi extender. The...





