IoT Technology and Its Security Issues

IoT Technology and Its Security Issues

With the development of 5G technology and the popularity of IPv6, the Internet of Things (IoT) industry has entered a period of rapid growth. IoT applications across various industries have surged, particularly in the industrial and power sectors. The intelligent and informational transformation of traditional industrial and power facilities through IoT technology and devices has … Read more

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

This report is jointly released by the National Internet Emergency Center (CNCERT) and Qihoo 360 Technology Co., Ltd. (Qihoo 360). 1 Overview Recently, CNCERT and Qihoo 360 have jointly monitored the emergence of a new DDoS botnet that is rapidly spreading on the internet. Tracking and monitoring have revealed that the number of domestic compromised … Read more

HTTP Flood Attacks: How the ‘Single Madman’ Uses ‘Legitimate Requests’ to Breach Your Server?

HTTP Flood Attacks: How the 'Single Madman' Uses 'Legitimate Requests' to Breach Your Server?

Today, let’s discuss something more insidious—did you think DDoS attacks are all about overwhelming traffic? Wrong! There is a type of attack that disguises itself as a normal user, using legitimate requests to drain your server, known as the pinnacle of “legitimate scamming”! It is the HTTP Flood, colloquially referred to as the “Single Madman”—it … Read more

Protection Against HTTP Flood Attacks in Web Firewalls

Protection Against HTTP Flood Attacks in Web Firewalls

1. Overview of HTTP Flood Attacks An HTTP flood attack is a type of Distributed Denial of Service (DDoS) attack where the attacker overwhelms the target server with a large number of forged HTTP requests (such as GET/POST), exhausting server resources (like connection count, CPU, memory) and preventing legitimate users from accessing the service. Unlike … Read more

Analysis of ADDP Protocol and Its Potential for DDoS Reflection Attacks

Executive SummaryIn recent years, an increasing number of protocols capable of causing UDP reflection attacks have come to the forefront, such as CoAP[1], Ubiquiti[2], WS-Discovery[3], OpenVPN[4], and a certain DVR protocol[5]. These attack methods differ from the well-known reflection attack types like DNS, SSDP, NTP, and Memcached, posing certain challenges for DDoS attack protection. In … Read more

Botnets Trigger IoT Security Battle: Discussing Embedded Security

The rise of Internet of Things (IoT) botnets has become a security threat in emerging industries such as smart homes, smart cities, and industrial networking. Distributed Denial of Service (DDoS) attacks from botnets have been around for some time, and IoT botnets are not new either. Botnets and Their Potential Threats A botnet refers to … Read more

Industrial Control System Cybersecurity: Attack Types and Prevention

Industrial Control System Cybersecurity: Attack Types and Prevention

Catastrophic incidents may result from insecure industrial control systems. Enhancing cybersecurity across the entire system can be achieved through four steps. Despite the fact that cybersecurity has always been a major concern for any industry, it is commonly believed that attacks only lead to loss of proprietary data, becoming victims of espionage, and facing threats … Read more

How Hackers Overcome TCP/IP!

How Hackers Overcome TCP/IP!

Follow “Script Home ” with millions of developers Source / Warm Blue Notes (ID: yqy94xq95) Content published with authorization This article mainly reviews common attacks on TCP/IP, aiming to provide at least a basic understanding. Introduction Introduction 1 IP Spoofing What is IP? In a network, every device is assigned an address. This address is … Read more

CoAP: The Next Protocol Vulnerable to DDoS Attacks

CoAP: The Next Protocol Vulnerable to DDoS Attacks

Click the blue text to follow us with one click “ Dream Thinker NetworkSecurity Guardian ” Security researchers indicate that RFC 7252, also known as the Constrained Application Protocol (CoAP), is about to become one of the most abused protocols in DDoS attacks. What is CoAP? CoAP was officially approved in 2014 and has only … Read more