Recently a Ransom Denial of Service (RDoS) group going by the name ‘REvil’ targeted VoIP.ms with a DDoS attack that disrupted phone services. VoIP.ms provides voice-over-IP services to businesses around the world. Here is the now removed extortion letter posted
The attack landscape continues to grow rapidly, and with that growth comes the complex challenge of tracking the Tactics, Techniques, and Procedures (TTPs) used by different threat actors. The National Institute of Standards and Technology’s (NIST) Computer Security Resource Center
Surprisingly, the answer is yes. After Anonymous fell apart in 2016, the threat landscape shifted rapidly. The once mainstream group of organized Denial of Service (DoS) attacks with simple GUI-based tools were no more; as the era of Distributed Denial
A Look at Digital Attacks on Gaming Resources Throughout the last year of the pandemic, we have seen increases in the volume of attacks targeting gaming companies and the number of attacks targeting players and content streamers. But this should
I know a lot of us are currently wrapped up in the SolarWinds and ProxyLogon events. Still, I just wanted to take a moment to quickly highlight the risk residential routers face from the propagation of IoT botnets and the problem devices present once
Whenever there is an opportunity or a racket to run, organized criminals will naturally appear. And appear they have over the last decade. As more people and devices become connected in the wake of the digital transformation, more opportunities to
Bitcoin, the first blockchain-based cryptocurrency, was created by Satoshi Nakamoto in 2008 and released to the public in 2009. It is a decentralized digital currency without the need for a central bank. Over the last decade, it has evolved from
Last week, I took a deep dive into U.S. election-related topics, including the government’s response to potential cyber threats, the issue of malspam during the election, and whether or not nation-state attacks had a meaningful impact on the election. It’s not always DDoS. While many
Every election process, going back for ages, has faced the threat of possible election interference in one form or another. The only thing that has changed in terms of foreign election intervention today is the way current operations are conducted
Malspam, or malicious spam, is one of the most common and problematic attack vectors currently plaguing the cyber threat landscape. It is a very effective method for delivering emails in bulk that contain a phishing message directing victims to either