CARVIEW |
- Home
-
Topics
-
Blogs
-
News
-
Community
-
Industry
Blogs
Visit of US House Speaker Pelosi to Taiwan Has Little Impact on Network Infrastructures
I'm writing this from Taipei, where I have lived in peace for over 10 years. Sadly I learned that during this week, intermediate-range ballistic missiles (operated by China) have flown far above the capital of Taiwan and that five of them have landed in the waters of Japan's exclusive economic zone (EEZ). This provocative live-firing drill came as a direct response from China following Pelosi's visit.
- By Thomas Kuiper
- Comments: 0
- Views: 31,846
New Research Indicates Nearly 80% of Top US Energy Companies Are at Serious Risk for Cyberattacks
In light of the Biden administration's recent efforts in protecting critical infrastructure from cyber threats, new research from CSC indicates that a majority of the top energy companies in the U.S. are vulnerable to attack due to shortcomings in their online operations. Specifically, these organizations are vulnerable to domain name and domain name system (DNS) hijacking and phishing attacks based on their lack of effective domain security.
- By Vincent D'Angelo
- Comments: 0
- Views: 34,713
A Brief Look at the Domain Attack Surface of Streaming Media Companies
The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max.
- By Jonathan Zhang
- Comments: 3
- Views: 34,261
New CSC Research Finds Significant Lack of Redundancy for Enterprise DNS
As outlined in CSC's recent 2020 Domain Security Report: Forbes Global 2000 Companies, cybercriminals are disrupting organizations by attacking the protocol responsible for their online presence -- their domain name system (DNS). When a DNS is overwhelmed with traffic due to a distributed denial of service (DDoS) attack or configuration error, content and applications become inaccessible to users, affecting both revenue and reputation.
- By Vincent D'Angelo
- Comments: 0
- Views: 32,578
DNS: An Essential Component of Cloud Computing
The evolution of the internet is anchored in the phenomenon of new technologies replacing their older counterparts. But technology evolution can be just as much about building upon what is already in place, as it is about tearing down past innovations. Indeed, the emergence of cloud computing has been powered by extending an unlikely underlying component: the more than 30-year-old global Domain Name System (DNS).
- By Dr. Burt Kaliski Jr.
- Comments: 1
- Views: 33,572
Putting COVID-19 Traffic Growth Into Perspective
Nokia Deepfield is another company that works in the background on the web, and that analyzes data traffic patterns for the big ISPs. Their June 4 report on web traffic reports about the same thing we're hearing from most large ISPs -- the volume of web traffic suddenly shot up since the onset of the pandemic. Nokia Deepfield says that the increase in traffic has settled in at about a 25% increase over pre-COVID levels.
- By Doug Dawson
- Comments: 0
- Views: 29,468
6 Ways to Strengthen DNS Security
The domain name system (DNS) grew to prominence during the initial, innocent days of the internet. During that time, early internet users tended to work for government or education organizations where trust was assumed, and security was not even a consideration. Since the online community was small and the internet was sparsely used, the importance of DNS was not widely understood, and as a consequence, left undefended.
- By Vincent D'Angelo
- Comments: 1
- Views: 37,263
Lessons Learned from the Namejuice/DROA/DROC Outage
Last week an ICANN registrar, Namejuice, went off the air for the better part of the day -- disappearing off the internet at approximately 8:30 am, taking all domains delegated to its nameservers with it, and did not come back online until close to 11 pm ET. That was a full business day and more of complete outage for all businesses, domains, websites, and email who were using the Namejuice nameservers -- something many of them were doing.
- By Mark Jeftovic
- Comments: 0
- Views: 30,174
The Recent and Rapid Evolution of DDoS Attacks
In October of 2016 the Mirai botnet came thundering onto the internet landscape. A digital Godzilla, a DDoS King Kong, this Internet of Things-powered behemoth began smashing DDoS attack records, online powerhouses like Reddit, Etsy, Spotify, CNN and the New York Times crumbling under its fists. When the dust had settled, and services had been restored, one thing seemed certain: a new era of DDoS attacks was upon us. Mirai was terrifying as a botnet but even worse as a harbinger.
- By Patrick Vernon
- Comments: 0
- Views: 21,778
1 Terabit DDoS Attacks Become a Reality; Reflecting on Five Years of Reflections
Reflection amplification is a technique that allows cyber attackers to both magnify the amount of malicious traffic they can generate, and obfuscate the sources of that attack traffic. For the past five years, this combination has been irresistible to attackers, and for good reason. This simple capability, of turning small requests into larger, 'amplified' responses, changed the Distributed Denial of Service (DDoS) attack landscape dramatically.
- By Carlos Morales
- Comments: 1
- Views: 19,335
CircleID’s Top 10 Posts of 2017
It is once again time for our annual review of posts that received the most attention on CircleID during the past year. Congratulations to all the 2017 participants for sharing their thoughts and making a difference in the industry. 2017 marked CircleID's 15th year of operation as a medium dedicated to all critical matters related to the Internet infrastructure and services. We are in the midst of historic times, facing rapid technological developments and there is a lot to look forward to in 2018.
- By CircleID Reporter
- Comments: 0
- Views: 42,276
DDOS and the DNS
The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up there with the Morris Worm of 1988, Slammer of 2002, Sapphine/Slammer of 2009 and of course Conficker in 2008. What made the Mirai attack so special?
- By Geoff Huston
- Comments: 0
- Views: 18,882
The IoT Needs a Paradigm Shift from Security to Safety of Connected Devices
Building IoT ventures from scratch by prototyping hardware devices and their backend systems as well as working for a large company that tries to sell IoT devices itself, we learned a lot about the pitfalls and problems concerning security in the IoT. Nearly every connected device out there proved to be vulnerable to attacks. Researchers showed that it's possible to remotely take control over autonomous vehicles, implanted medical devices were manipulated, voting machines compromised and of course all sorts of other "smart" devices...
- By Martin Unger
- Comments: 1
- Views: 28,240
The Internet is Dead - Long Live the Internet
Back in the early 2000s, several notable Internet researchers were predicting the death of the Internet. Based on the narrative, the Internet infrastructure had not been designed for the scale that was being projected at the time, supposedly leading to fatal security and scalability issues. Yet somehow the Internet industry has always found a way to dodge the bullet at the very last minute.
- By Juha Holkkola
- Comments: 3
- Views: 24,021
No One is Immune: Qatar Crisis Started by a Targeted Poli-Cyber Attack
The Qatar Crisis started with a targeted Poli-Cyber hack of an unprecedented nature. Its shockwaves and repercussions continue to alter political and business fortunes, directions and paradigms not only in the Gulf region but globally. Almost everyone around the world is now aware of the this crisis that started early June. By mid July a Washington Post report cited US intelligence officials that the UAE orchestrated hacking of Qatari government sites, sparking regional upheaval that started it all.
- By Khaled Fattal
- Comments: 0
- Views: 17,800
News Briefs
Sudanese Nationals Charged in Global Cyberattack Campaign
- Oct 17, 2024 7:15 AM PDT
- Comments: 0
U.S. Schools Targeted in Ransomware Attacks: White House Responds
- Aug 09, 2023 10:53 AM PDT
- Comments: 0
German Authorities Seize Servers of Cybercriminal DDoS-for-Hire Service FlyHosting
- Apr 01, 2023 3:17 PM PDT
- Comments: 0
NCA Launches Campaign to Curb DDoS-for-Hire Website Use, Warns of Legal Risks
- Mar 29, 2023 12:48 PM PDT
- Comments: 0
DDoS Attacks Are Surging Both in Frequency and Sophistication
- Nov 24, 2020 12:49 AM PST
- Comments: 0
DDoS Storm Is Coming, Warn Researchers Noting an 84% Surge in the First Quarter of 2019
- May 22, 2019 8:21 PM PDT
- Comments: 0
Frequency of DDoS Attacks Risen by 40% While Duration of Attacks Decrease
- Sep 12, 2018 9:58 PM PDT
- Comments: 0
Oracle Launches Internet Intelligence Map Providing Insight Into the Impact of Internet Disruptions
- Jun 13, 2018 5:47 PM PDT
- Comments: 0
FCC Accused of Intentionally Lying to Media Saying Net Neutrality Comment Flood Was Cyberattack
- Jun 06, 2018 5:16 PM PDT
- Comments: 0
New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol
- May 15, 2018 3:08 PM PDT
- Comments: 0
World’s Largest DDoS-for-Hire Service Taken Down in Major International Probe
- Apr 26, 2018 1:02 AM PDT
- Comments: 0
1.3 Tbps DDoS Attack Against GitHub is Largest Attack Seen to Date, Says Akamai
- Mar 02, 2018 7:48 PM PST
- Comments: 1
‘First True’ Native IPv6 DDoS Attack Reported
- Feb 28, 2018 8:16 PM PST
- Comments: 1
Report Estimates Cybercrime Taking $600 Billion Toll on Global Economy
- Feb 21, 2018 9:30 PM PST
- Comments: 0
Botnets Shift Focus to Credential Abuse, Says Latest Akamai Report
- Feb 20, 2018 5:49 PM PST
- Comments: 0
Researchers Find One-Third of IPv4 Address Space Under Some Type of DoS Attack
- Nov 05, 2017 8:50 PM PST
- Comments: 0
U.S. Critical Infrastructure Will Be Attacked Within 2 Years, According to 2017 Black Hat Survey
- Jul 11, 2017 9:46 PM PDT
- Comments: 0
Petya Ransomware Spreading Rapidly Worldwide, Effecting Banks, Telecom, Businesses, Power Companies
- Jun 27, 2017 7:23 PM PDT
- Comments: 0
South Korean Banks Receive DDoS Threat from Hacker Group, Record Ransomware Payment Demanded
- Jun 27, 2017 6:02 PM PDT
- Comments: 0
FBI, DHS Release Technical Details on North Korea’s DDoS Botnet Infrastructure
- Jun 13, 2017 10:11 PM PDT
- Comments: 0
Most Viewed
Port 25 Blocking, or Fix SMTP and Leave Port 25 Alone for the Sake of Spam?
- Apr 17, 2005
- Views: 179,659
IPv6: Extinction, Evolution or Revolution?
- Jan 07, 2006
- Views: 73,887
New Instance of DNS Root Server Makes Internet History
- Jan 28, 2004
- Views: 54,099
Thoughts About “Protection Against BIND”
- Oct 11, 2004
- Views: 49,083
Network Solutions Under Large Scale DDoS Attack, Millions of Websites Potentially Unreachable
- Jan 23, 2009
- Views: 46,871
Most Commented
Port 25 Blocking, or Fix SMTP and Leave Port 25 Alone for the Sake of Spam?
- Comments: 31
- Views: 179,659
IPv6: Extinction, Evolution or Revolution?
- Comments: 18
- Views: 73,887
Sorry, Not Sorry: WHOIS Data Must Remain Public
- Comments: 14
- Views: 34,405
A Question of DNS Protocols
- Comments: 11
- Views: 46,607
Can We Stop IP Spoofing? A New Whitepaper Explores the Issues
- Comments: 10
- Views: 26,022
Industry Updates
Alleviating BlackEnergy-Enabled DDoS Attacks
- By WhoisXML API
- Oct 21, 2022
Meet the Speakers of the Cyber Threat Mitigation Webinar (by IPXO)
- By IPXO
- Apr 01, 2022
QAnon and 8Chan Digital Footprint Analysis and Investigation Expansion
- By WhoisXML API
- Dec 30, 2020
How to Maintain Your Website’s Network Reachability with DNS Lookup Solutions
- By WhoisXML API
- Apr 10, 2020
Under the Radar DDoS Attacks Increase by 158 Percent in Q2, 2019 Compared to the Same Time Last Year
- By GoDaddy Registry
- Aug 14, 2019
Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm
- By GoDaddy Registry
- Apr 29, 2019
Neustar to Acquire Verisign’s Security Services Customer Contracts
- By GoDaddy Registry
- Oct 26, 2018
Q2 2018 DDoS Trends Report: 52 Percent of Attacks Employed Multiple Attack Types
- By Verisign
- Sep 28, 2018
Q1 2018 DDoS Trends Report: 58 Percent of Attacks Employed Multiple Attack Types
- By Verisign
- Jun 29, 2018
Q4 2017 DDoS Trends Report: Financial Sector Experienced 40 Percent of Attacks
- By Verisign
- Mar 20, 2018
Attacks Decrease by 23 Percent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report
- By Verisign
- May 25, 2017
Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016
- By Verisign
- Feb 14, 2017
Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate
- By Verisign
- Nov 29, 2016
Don’t Gamble With Your DNS
- By GoDaddy Registry
- Oct 21, 2016
Defending Against Layer 7 DDoS Attacks
- By Verisign
- Oct 04, 2016
Participants – Random Selection
View MoreSECTIONS: Home | Topics | Featured Blogs | News Briefs | Industry Updates | Community
TERMS OF USE: Codes of Conduct | Privacy Policy | Terms of Use
Copyright © 2002-2025 CircleID. All rights reserved unless where otherwise noted.
Local Time: Monday, July 14, 2025 03:38 PM PDT – Page Load: 0.3500 Sec.