Cyber attacks

Cyber attacks

Slowloris attack explained in details

In the realm of cybersecurity, various attack techniques have evolved over time, each with its own unique approach and set of challenges. One such technique is the Slowloris attack, a stealthy and efficient method employed by malicious actors to cripple web servers without the need for a massive botnet or heavy network traffic. In this blog post, we will delve into the details of the Slowloris attack, exploring its mechanisms, potential impacts, and how to defend against it.

Understanding the Slowloris Attack

The Slowloris attack, named after the slow-moving nature of a certain type of lizard, is a low-and-slow Denial of Service (DoS) attack designed to exploit a web server’s capacity to handle concurrent connections. Unlike traditional DoS attacks that flood a target server with a high volume of traffic, the Slowloris attack operates differently. It capitalizes on the server’s vulnerability to handling multiple slow, incomplete HTTP requests.

(more…)
Cyber attacks, Network

Phishing attack – What is it and how to avoid it?

Today we will talk about the Phishing attack. What is its main purpose, its different types, and how to avoid it, we will explore later. So, don’t waste any more time, and do it.

Phishing attack – Definition

A phishing attack is a type of cyber threat. This strategy has been used by cybercriminals for a long time. The term “phish” is a combination of the words “fish” and “baiting.” The criminals are attempting to persuade the victim to do one of the following:

  • Input data. A bogus site that looks exactly like a popular one asks you to enter in personal information such as email addresses, passwords, usernames, and bank account numbers.
  • Obtain a file. The file includes a virus that will harm your computer. They may demand payment to regain control of your device.

They transmit a message that appears traditional and is difficult to distinguish from others. However, it is usually well-written and gives something that the victim desires. Another option is to make the notification appear urgent by stating that the password must be changed in X amount of time.

(more…)

Cyber attacks, DNS

3 Most Common DNS attack types

The DNS infrastructure is a target to countless attacks. And when we say countless, we mean it. Just in 2020, there were around 10 million (data from NETSCOUT Threat Intelligence Report)! So, we are all under constant DNS attacks.

The 3 most common DNS attack types that you can suffer are the following:

1. DNS spoofing attack

The DNS spoofing attack (also known as DNS poisoning) is a very common DNS attack type that involves modified DNS records that the bad actor inserts inside the cache memory of the DNS resolvers. The modified records usually lead to a different IP address than the original name records. The visitors get redirected to the domain of the bad actor. There they can share sensitive data that could later be used for different illegal activities – stealing money or identity.

Suggested article: 5 DNS Attacks Types that could affect you

(more…)

Cyber attacks, DNS, Network

What is a Teardrop attack and how can it affect you?

A Teardrop attack is a type of Denial-of-Service attack in which the criminal delivers large volumes of malware data to the targeted machine, causing it to fall. Let’s plumb its depths and explain more.

Teardrop attack – detailed explanation

One of the most common DoS (Denial-of-Service) attacks is the Teardrop DoS attack. Its goal is to inundate its target with malicious fragmented data packets that the victim will be unable to reconstruct and, as a result, will be unable to operate. This exploit takes advantage of a unique flaw in the TCP/IP reassembly procedure. As a result, the fragmented data packets exceed the victim’s capacity until it crashes while attempting to process them.

(more…)

Cyber attacks, DNS

What is DNS spoofing and how to protect yourself?

What does DNS spoofing mean?

DNS spoofing is a form of cybercrime. Criminals insert spoofed or stolen DNS records into a recursive server’s cache. This is due to answering DNS users’ queries with a falsified record, such as a forged IP address. Legitimate traffic is therefore fraudulently redirected to dangerous places (generated websites). Once there, consumers may be compelled to enter sensitive information (passwords, bank credit card details, etc.) for hackers to exploit later.

(more…)

Cyber attacks

Ping of Death: Everything you need to know.

The ping command is another good example of how technology can be used for positive, but also for evil purposes. This useful and basic tool can become a Ping of Death for your online business. Like with all cyber threats, the best is to be aware of it. Here you have everything you need to know about the Ping of Death!

What is Ping of Death?

Ping of Death (PoD) attack is a denial of service or DoS attack that relies on the use of the ping command for sending oversized packets of data to a specific target with the clear objective of destabilizing it and shutting it down.

(more…)

Cyber attacks

​3 Significant Cyber Attacks In Recent Years.

The cyber attacks are like to get into the twilight zone of the Internet. There’s no way to talk about them without getting goose bumps. Every time they happen, we know there were victims, and for sure big losses. Obviously, we wouldn’t like to be in their shoes.

Let’s take a tour around 3 significant cyber attacks in recent years. The last case is a real red warning!

(more…)