Apr 06, 2018 (MODIFIED: Apr 17, 2018)
Sara Boddy, Ilan Meller, Justin Shattuck, Damien Rocha
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.
Mar 13, 2018 (MODIFIED: Mar 30, 2018)
Sara Boddy, Justin Shattuck
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
Mar 02, 2018 (MODIFIED: Apr 12, 2018)
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
Sept 01, 2017 (MODIFIED: Oct 04, 2017)
Julia Karpin, Liron Segal, Maxim Zavodchik
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.
Aug 09, 2017 (MODIFIED: Dec 21, 2017)
With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future.
May 10, 2017 (MODIFIED: Aug 07, 2017)
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
Nov 15, 2016 (MODIFIED: Jul 06, 2017)
A new DDoS attack vector that leverages LDAP for reflection-amplification attacks is seeing increased usage.
Oct 08, 2016 (MODIFIED: Jul 06, 2017)
Justin Shattuck, Sara Boddy
The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.
Oct 06, 2016 (MODIFIED: Jul 06, 2017)
The Mirai botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access.
Jun 13, 2016 (MODIFIED: Jul 06, 2017)
DDoS attacks have been common since the late 2000s, but average attack peaks have increased to 100+ Gbps.
Jun 01, 2016 (MODIFIED: Jul 06, 2017)
Anonymous commoditizes well-known DDoS attacks by making easy-to-use tools, available to even the most unsophisticated user.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.