Summary

Total Articles Found: 4

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Hacker Leaks More Than 500K Telnet Credentials for IoT Devices
  • Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack
  • CVE-2022-26143: A Zero-Day vulnerability for launching UDP amplification DDoS attacks
  • TsuNAME flaw exposes DNS servers to DDoS attacks

CVE-2022-26143: A Zero-Day vulnerability for launching UDP amplification DDoS attacks

Published: 2022-03-08 15:22:13

Popularity: None

Author: Omer Yoachimik

Keywords:

  • DDoS
  • Zero-Day
  • Attacks
  • Managed Rules
  • Mitel
  • 0-Day
  • Exploit
  • Vulnerabilities
  • A zero-day vulnerability in the Mitel MiCollab business phone system has recently been discovered (CVE-2022-26143). This vulnerability, called TP240PhoneHome, which Cloudflare customers are already protected against, can be used to launch UDP amplification attacks

    ...more

    TsuNAME flaw exposes DNS servers to DDoS attacks

    A flaw in some DNS resolvers, tracked as TsuNAME, can allow attackers to launch DDoS attacks against authoritative DNS servers. Researchers at SIDN Labs (the R&D team of the registry for .nl domains), InternetNZ (the registry for .nz domains), and the Information Science Institute at the University of Southern California has discovered a vulnerability, named […] The post TsuNAME flaw exposes DNS servers to DDoS attacks appeared first on Security Affairs.

    ...more

    Hacker Leaks More Than 500K Telnet Credentials for IoT Devices

    Published: 2020-01-21 11:57:20

    Popularity: 568

    Author: Elizabeth Montalbano

    Keywords:

  • Breach
  • IoT
  • Web Security
  • botnet
  • Credentials
  • CyCognito
  • data breach
  • data leak
  • DDoS
  • DDoS attacks
  • hacker
  • IoT security
  • Password
  • Security
  • Telnet
  • Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.

    ...more

    Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack

    Why many attack techniques can be reused – but organizations can't defend against them.

    ...more

    end