Home Search

DDoS attacks - search results

If you're not happy with the results, please do another search
Google Announced US$1 Million for its “Be Internet Awesome” Initiative

Google Updates its Political Ads Policy

0
In order to increase voters' confidence in political ads, Google recently announced that it is making a few changes in handling political ads on...
Kaspersky Lab

Kaspersky partners with INTERPOL to jointly fight Cybercrimes

0
Cybersecurity firm Kaspersky and INTERPOL have recently signed a new five-year agreement to jointly fight against cybercrimes around the world. The new contribution agreement...
Rootkits, Mobile Malware in Asia

New Malware campaign ViceLeaker targeting Android Devices: Researchers

0
Security researchers revealed an ongoing Android malware campaign dubbed ViceLeaker that has been active since 2016. According to the researchers from Kaspersky, a hacker group...
Google Announced US$1 Million for its “Be Internet Awesome” Initiative

Google to offer anti-hacking tools ahead of EU elections

0
Search engine giant Google announced that it’s going to offer anti-hacking technology, named as Project Shield, to political organizations in Europe ahead of the...
Data breach in 100 U.S. cities

Southeast Asia houses 9000 infected servers

0
The cybercrime wing of the Interpol has revealed that seven southeast Asian nations have nearly 9000 malware-laden servers. Apart from these, the Interpol also...
blockchain

How Blockchain Is Shaping Cyber Security and Causing Technology Disruptions for Global Enterprises

0
The Blockchain industry continues to change the lives of not just enterprises but also individuals, helping them lay the foundations of their services and...
Log4j

Log4j Explained: How It Is Exploited and How to Fix It

0
Log4j or Log4Shell, a critical vulnerability in the widely used Apache Log4j Library, has raised alarms and security concerns across the tech and info...
Log4Shell

Hackers Actively Exploit Log4Shell Flaw in Apache Log4j

0
Log4Shell, a severe zero-day vulnerability in Apache Log4j library, sheds light on the risky practices of organizations relying on open-source code libraries to build...
MikroTik Devices, ASUS Routers

Around 300,000 MikroTik Devices Vulnerable to Hacker Intrusions

0
Threat actors often prey on vulnerable devices to break into targeted networks. With most employees working remotely, cybercriminals increased their hacking attempts targeting vulnerable...
Zoho Vulnerability , Atlassian Confluence Vulnerability

Google Takes Legal Action Against Glupteba Botnet

0
Google recently disrupted the malware activities of a sophisticated botnet – Glupteba. The search engine giant claimed the Glupteba botnet has been targeting Windows...