Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…