Attack of the Shuriken: Many Hands, Many Weapons

July 1, 2015 Arbor_Networks


The expected evolution of DDoS attacks continues. Attack sizes increase over time, tools become easier to use, more threat actors are launching attacks, older attack techniques have become commoditized and new attack techniques are added to the mix on a regular basis. Attacks are cheap, easy, and extremely common. The criminal underground continues to provide services and continues to obtain funding for providing those services, which provides further incentive for additional attackers to join the game. Download this presentation, which summarizes ASERT’s Curt Wilson’s blog post that dives deeper into each of the major attacker toolkits in heavy use today on the cybercrime underground. You can read that blog post here: http://bit.ly/1JuCn8R

Read more...

Previous Article
Attack of the Shuriken: Many Hands, Many Weapons
Attack of the Shuriken: Many Hands, Many Weapons

The expected evolution of DDoS attacks continues. Attack sizes increase...

Next Article
Best Practices: Using Your Network and the Cisco ASR 9000 for DDoS Protection
Best Practices: Using Your Network and the Cisco ASR 9000 for DDoS Protection

DDoS attacks are rising in size, frequency and complexity; recent research...