The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex

0/5 No votes

Report this app


As a whole Considering the effects of Texas ’SB8 abortion law, internet infrastructure companies have become an unlikely focal point. Multiple hosting and domain registration providers have refused to provide services on the abortion ‘whistle blower’ site for violating the Terms of Service relating to the collection of data about third parties. The site, which aims to collect tips from people who have had, performed or facilitated abortions in Texas, has been down for more than a week.

Meanwhile, as Apple continues to grapple with its proposed controversy પરંતુ but has now stalled યોજના plans to scan the iPhone for child sexual abuse content, WhatsApp has moved to remove its biggest end-to-end encryption loophole this week. The ubiquitous secure communications platform can’t peek your message at any time on their digital journey, but if you back up your chats to a third-party cloud service like iCloud or Google Cloud, the messages will no longer be encrypted. With some clever cryptography, the service was able to devise a method of encrypting backups before it was finally sent to the cloud for storage.

After handing over an activist’s IP address to law enforcement, secure email service ProtonMail said this week that it was updating its policies to clarify that customer metadata may be legally collected. The service emphasizes, however, that the actual content of emails sent on the platform is not always end-to-end encrypted and readable, even on Protonmail.

And 20 years after the September 11, 2001, attacks, privacy researchers are still thinking about the continued impact of the tragedy on surveillance attitudes in the United States.

But wait, there’s more! We do not cover all the security news wires in detail every week. Click on the headlines to read the full stories and stay safe there.

Russian tech giant Yandex said this week that in August and September it was the Internet’s largest-ever record-breaking denial-of-service or DDoS attack. The flood of junk traffic was meant to submerge the systems and bring them down, which peaked on September 5, but Yandex successfully defended even against that largest barrage. “Our experts managed to repel a record-breaking attack of about 22 million requests per second,” the company said in a statement. “This is the biggest known attack in the history of the Internet.”

The Russian national idea for working with the infamous malware gang Trickboat was arrested at Seoul International Airport last week. Only known as Shri. In local media, the man was trying to move to Russia after spending more than two years in South Korea. After arriving in February 2020, Shri. A was stranded in Seoul due to international travel restrictions related to the COVID-19 epidemic. During this time his passport expired and Mr. A had to get an apartment in Seoul while working on a replacement with the Russian embassy. At the same time, United States law enforcement officials began investigating the activity of TrickBot, specifically related to the botnet group, which was developed to help with the 2020 ransomware attack. During the investigation, the officers collected Shree’s evidence. A’s alleged work with TrickBot, including the possible 2016 development of a malicious browser tool.

An error in the United Kingdom version of the McDonald’s Monopoly VIP game reveals the usernames and passwords of the game’s database for all winners. Due to the defect, data about both the game’s production and the staging server will appear in the prize redemption emails. The open information includes Microsoft Azure SQL database details and credentials. The winner who received the credentials might not have logged into the production server because of a firewall, but could have accessed the staging server and obtained winning codes to redeem more prizes.

The hackers released 500,000 Fortinet VPN credentials, usernames and passwords, which were collected last summer from apparently vulnerable devices. The bug they used to collect the data has been patched, but some of the stolen credentials may still be valid. This will allow bad actors to log in to organizations’ Fortinet VPNs and access their networks to install m network loaders, steal data or carry out other attacks. The data dump published by the ransomware gang Offshoot, known as “Orange”, was posted for free. “CVE-2018-13379 is an old vulnerability that was resolved in May 2019,” Fortinet said in a statement. Leep ng computer. “If customers have not done so, we urge them to apply for an immediate upgrade and mitigation.”

More great wired stories

Leave a Reply

Your email address will not be published.