attacks
- How to Prevent Phishing Attacks | Netcraft
- Exploring Internet traffic shifts and cyber attacks during the 2024 US election
- Fake attachment. Roundcube mail server attacks exploit CVE-2024-37383 vulnerability
- Training a million models per day to save customers of all sizes from DDoS attacks
- Protect against identity-based attacks by sharing Cloudflare user risk scores with Okta
- Vulnerable APIs and Bot Attacks Costing Businesses up to $186 Billion Annually – Company
- VU#244112 – Multiple SMTP services are susceptible to spoofing attacks due to insufficient enforcement
- VU#456537 – RADIUS protocol susceptible to forgery attacks.
- French elections: political cyber attacks and Internet traffic shifts
- UK election day 2024: traffic trends and attacks on political parties
- First round of French election: party attacks and a modest traffic dip
- Using machine learning to detect bot attacks that leverage residential proxies
- Dutch political websites hit by cyber attacks as EU voting starts
- Threat actors misusing Quick Assist in social engineering attacks leading to ransomware | Microsoft Security Blog
- VU#421644 – HTTP/2 CONTINUATION frames can be utilized for DoS attacks
- Advanced DNS Protection: mitigating sophisticated DNS DDoS attacks
- Cyber attacks targeting Jewish and Holocaust educational websites surge by 872
- Cyber attacks in the Israel-Hamas war
- Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2 | MSRC Blog | Microsoft Security Response Center
- HTTP/2 Zero-Day Vulnerability Results in Record-Breaking DDoS Attacks
- Internet traffic patterns in Israel and Palestine following the October 2023 attacks
- Millions of Exim mail servers exposed to zero-day RCE attacks
- An August reading list about online security and 2023 attacks landscape
- WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch BEC Attacks | SlashNext
- Storm-0978 attacks reveal financial and espionage motives | Microsoft Security Blog
- Phishing attacks already using the .zip TLD | Netcraft
- Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks | MSRC Blog | Microsoft Security Response Center
- Major Upgrade to Darktrace/Email™ Product Defends Organizations Against Evolving Cyber Threat Landscape, Including Generative AI Business Email Compromises and Novel Social Engineering Attacks • Darktrace Newsroom
- Killnet and AnonymousSudan DDoS attack Australian university websites, and threaten more attacks — here’s what to do about it
- Top 50 most impersonated brands in phishing attacks and new tools you can use to protect your employees from them
- The White House’s National Cybersecurity Strategy asks the private sector to step up to fight cyber attacks. Cloudflare is ready
- One year of war in Ukraine: Internet trends, attacks, and resilience
- Multilingual Executive Impersonation Attacks | Abnormal Intelligence
- Uptick in healthcare organizations experiencing targeted DDoS attacks
- ESET Research: Russian APT groups, including Sandworm, continue their attacks against Ukraine with wipers and ransomware | ESET
- Email Link Isolation: your safety net for the latest phishing attacks
- The latest on attacks, traffic patterns and cyber protection in Ukraine
- Stop attacks before they are known: making the Cloudflare WAF smarter
- DDoS and bot attacks in 2022: Business sectors at risk and how to defend
- Introducing Cloudflare Adaptive DDoS Protection – our new traffic profiling system for mitigating DDoS attacks
- Zero-day in WPGateway WordPress plugin actively exploited in attacks
- Google Chrome emergency update fixes new zero-day used in attacks
- 80
- 2022 attacks! An August reading list to go “Shields Up”
- Survey reveals companies hit with cyber attacks likely to face repeated onslaughts – Cymulate
- Vulnerability within the UNISOC baseband opens mobile phones communications to remote hacker attacks – Check Point Research
- Zero Trust Research Reveals Nearly Half of All Security Leaders Do Not Believe They Will Be Breached Despite Increasing Attacks and Adoption of Zero Trust Strategies | Illumio
- New Research Paper: Pre-hijacking Attacks on Web User Accounts – Microsoft Security Response Center
- The deluge of digital attacks against journalists
- What Cloudflare is Doing to Keep the Open Internet Flowing into Russia and Keep Attacks from Getting Out
- Cyber Attacks on NATO Countries Surge by 116
- CVE-2022-26143: A Zero-Day vulnerability for launching UDP amplification DDoS attacks
- Malware attacks targeting Ukraine government – Microsoft On the Issues
- Detecting Magecart-Style Attacks With Page Shield
- Taking Legal Action Against Phishing Attacks | Meta
- HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks – Microsoft Security Blog
- How to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLint | Snyk
- Trojan Source Attacks
- Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773)
- May I ask who’s calling, please? A recent rise in VoIP DDoS attacks
- Microsoft Outlook exposed to old-school phishing attacks due to bug | Windows Central
- KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS)
- ADV210003 – セキュリティ更新プログラム ガイド – Microsoft – Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS)
- How we protect users from 0-day attacks
- 2021-05 Out-of-Cycle Security Bulletin: Multiple Products: Multiple vulnerabilities related to aggregation and fragmentation attacks against Wi-Fi (FragAttacks) – Juniper Networks
- Supply Chain Attacks via GitHub.com Releases | Nightwatch Cybersecurity
- Mitigating Bot Attacks against Cloudflare
- New PoC for Microsoft Exchange bugs puts attacks in reach of anyone
- Ransom DDoS attacks target a Fortune Global 500 company
- Customer Guidance on Recent Nation-State Cyber Attacks – Microsoft Security Response Center
- Bees Use Dung as Tool to Ward off Giant Hornet Attacks, U of G Study Finds – U of G News
- Attacks exploiting Netlogon vulnerability (CVE-2020-1472) – Microsoft Security Response Center
- Identifying and protecting against the largest DDoS attacks | Google Cloud Blog
- UK exposes series of Russian cyber attacks against Olympic and Paralympic Games – GOV.UK
- UK and partners condemn GRU cyber attacks against Olympic… – NCSC.GOV.UK
- (JP) Q3 2020 KnowBe4 Finds Coronavirus-Related Phishing Email Attacks Still Prevalent
- DDoS attacks have evolved, and so should your DDoS protection
- Microsoft Warns Windows Users of Incoming Attacks Due to Browser Zero-Day
- Microsoft and partners design new device security requirements to protect against targeted firmware attacks – Microsoft Security
- Hardening Firefox against Injection Attacks | Mozilla Security Blog
- One simple action you can take to prevent 99.9 percent of attacks on your accounts
- VU#918987 – Bluetooth BR/EDR supported devices are vulnerable to key negotiation attacks
- On the recent HTTP/2 DoS attacks
- 1 Million ProFTPD Servers Vulnerable To Remote Code Execution Attacks
- New FireEye Email Threat Report Reveals Increase in Social Engineering Attacks | FireEye
- Protecting Project Galileo websites from HTTP attacks
- Attacks on Closed WordPress Plugins
- ASUS Software Updates Used for Supply Chain Attacks | Symantec Blogs
- Update on cyber attacks March 21
- Fake EV certificates used in Steam trade phishing attacks | Netcraft
- VU#465632 – Microsoft Exchange 2013 and newer are vulnerable to NTLM relay attacks
- The rise of multivector DDoS attacks
- Vulnerability Note VU#581311 – TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks
- Vulnerability Note VU#283803 – Integrated GPUs may allow side-channel and rowhammer attacks using WebGL (“Glitch”)
- The memcached amplification attacks reaching 500 Gbps
- Memcached UDP Reflection Attacks – The Akamai Blog
- Memcrashed – Major amplification attacks from UDP port 11211
- DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path | McAfee Blogs
- Dutch tax office, banks hit by DDoS cyber attacks
- 【緊急レポート】KRACKs(key reinstallation attacks:鍵再インストール攻撃)について | NTTデータ先端技術株式会社