Don’t Get Scammed During the Hypest Moment in History

This year’s Summer Olympics in Tokyo may arguably be one of the hypest and most technologically advanced sporting events in history. Unfortunately, many people will not be able to attend in person, and will miss out on the debut appearance

TCP Reflection Attacks: Then and Now

We recently published a blog post about the rise in TCP reflection attacks throughout 2019. The public was able to observe the reflection campaign’s targeting of different verticals because the criminal(s) behind the attacks are leveraging public infrastructure as their refractors.  Ultimately,

More Destructive Botnets and Attack Vectors Are on Their Way

What can I say? 2019 has been an eventful year for botnet operators. We have seen everything from large scale take-downs that target those that host malicious services to new and improved attack vectors. While the attack landscape continues to grow

Cybersecurity for Dummies

A little over a year ago I was honored to be asked by Joseph Steinberg to technically review an educational piece designed to help families and businesses mitigate common cyber threats. Today, Cybersecurity for Dummies began shipping, providing users with

Botnets: Architectures, Countermeasures, and Challenges

Summary: This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address

Gaming Companies Beware: Cyber Criminals Are Coming For You, Too

Last month I wrote about how cyber criminals are targeting gamers around the world and the steps we need to take to help educate users. While gamers are highly targeted, cyber criminals are not solely focused on the user. They are also

Gamers Beware: Cyber Criminals Are Coming For You

It’s been 17 years since Xbox Live was first released. While it was not the first online gaming network, it did become a cornerstone of things to come. Fast forward almost two decades, and we find ourselves completely immersed in

The Normalization of DDoS Attacks

In June, I traveled to Israel to attend BsidesTLV and Cyber Week. Both of these events included incredible presentations, workshops, and networking opportunities. They also provided many unique opportunities to discuss research, privacy, and policy on many different levels with industry leaders and

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today’s botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money. As a result, botherders are

Are Darknet Take-Downs Effective?

Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs are generally digital perp walks meant to remind the public that agents are doing their job, we have