Man who conducted DDoS attacks on Sony, Xbox & EA pleads guilty

By Waqas
Austin Thompson, a 23-year-old man from Utah has pleaded guilty to conducting DDoS attacks on gaming giants between 2013 to 2014. Among his targets were companies like EA Origin, Sony’s PlayStation Network, Steam, Microsoft’s Xbox,… Continue reading Man who conducted DDoS attacks on Sony, Xbox & EA pleads guilty

Cisco security appliances under attack, still no patch available

A vulnerability (CVE-2018-15454) affecting a slew Cisco security appliances, modules and firewalls is being exploited in the wild to crash and reload the devices, the company has warned on Thursday. About CVE-2018-15454 The vulnerability is in the Sess… Continue reading Cisco security appliances under attack, still no patch available

Disaster Recovery: Data Center or Host Infrastructure Reroute

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had a massive failure which directly… Continue reading Disaster Recovery: Data Center or Host Infrastructure Reroute

Wireshark can be crashed via malicious packet trace files

The Wireshark team has plugged three serious vulnerabilities that could allow an unauthenticated, remote attacker to crash vulnerable installations. According to Cisco researchers, proof-of-concept (PoC) code that demonstrates an exploit of each of the… Continue reading Wireshark can be crashed via malicious packet trace files

Bank of Spain Reveals Its Website Suffered a DoS Attack

The Bank of Spain revealed that bad actors used a denial-of-service (DoS) attack to temporarily disrupt access to its website. On 27 August, a spokesperson for Spain’s central bank disclosed the attack. They clarified that that incident didn&#821… Continue reading Bank of Spain Reveals Its Website Suffered a DoS Attack

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool – web browsers. At every point in time, there were 2-5 web browsers to support, a… Continue reading WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10