• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Feature

The Reaper Botnet is Here

November 10, 2017 By News Team Leave a Comment

In a recent Slate editorial, tech academic Josephine Wolff compared a rapidly growing new bot made up of millions of compromised Internet of Things (IoT) devices to the frightening anticipation of a hurricane gathering strength. Wolff said a … [Read more...] about The Reaper Botnet is Here

Filed Under: Bot Defense, Feature

Akamai Identifies New Fast Flux Botnet

November 10, 2017 By News Team Leave a Comment

Fast Flux is a DNS technique first introduced in 2006 which can be used by botnets to disguise different types of malicious activities (including malware delivery and communication, phishing and web proxying) behind a continuously shifting network of … [Read more...] about Akamai Identifies New Fast Flux Botnet

Filed Under: Bot Defense, Feature

DDoS Attacks On the Bitcoin Ecosystem

November 10, 2017 By News Team Leave a Comment

On October 24, 2017, a new cryptocurrency - Bitcoin Gold (BTG) - became the latest “fork” of the original Bitcoin with the explicit mission to “Make Bitcoin Decentralized Again”. The project's website immediately came under “massive” … [Read more...] about DDoS Attacks On the Bitcoin Ecosystem

Filed Under: Bitcoin, DDoS, Feature

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.