How botnets and application vulnerabilities have made DDoS attacks more damaging than ever before, and what you can do to fight back. Google. Twitter. Government websites. Fortune-500 companies. All are victims of crippling distributed denial-of-service (DDoS) attacks. The attacks have grown in reach and intensity thanks to botnets and a bounty of application flaws. This collection of articles will bring you up to speed on how the threat has evolved and what you can do to better protect your organization.UPDATED 3/12/2013 with full coverage of DDoS attacks against the banking sector.ARTICLESLatest DDoS attacks on banks: A teachable moment Strikes this week failed to disrupt banks’ online operations — but gave enterprises a better idea of how to tighten defensesMobile devices set to become next DDoS attack tool While no DDoS attacks have been linked to mobile devices, one analyst is convinced it’s only a matter of timeExpert fingers DDoS toolkit used in bank cyberattacksProlexic says ‘itsoknoproblembro’ kit’s uses points to sophisticated operationHacktivists strike U.S. Bank with volunteer-powered DDoSRather than launch the attack from a network of compromised machines, the attackers are said to be individuals running a one-click scriptBanks can only hope for best with DDoS attacks As with Tuesday’s attack on Wells Fargo, distributed denial of service attacks are said to be still crude but effectiveDDoS attacks against US banks peaked at 60 GbpsBanks are likely to be better protected against this wave of attacks, Arbor Networks researchers sayBad Security PR Watch: FUD with DDoS Welcome to another installment of “Bad Security PR Watch,” where Bill Brenner publicly shames PR folks who use FUD to sell me on a story idea. OK, it’s not exactly a public shaming. I keep names out. I just don’t have it in me to be that cold-blooded. This one is about the “growing” threat of DDoS attacks.What it’s like to get hit with a DDoS attackAkamai often finds itself scrambling to stop a DDOS attack against one or more of its clients.LOIC tool enables easy Wikileaks-driven DDoS attacksAs the tools employed within the pro-Wikileaks distributed denial-of-service attacks highlight, attack software is getting insanely simple to deploy and use.DDoS attacks are back (and bigger than before)DDoS attacks are back in the headlines. Thanks to the rapid proliferation of botnets, the threat may be bigger than the bad guys had even planned.DDoS returns: What researchers are learning about targets, tacticsTwo IT security specialists share what they’ve learned about the targets chosen for DDoS attacks and how to adjust security strategies based on those lessons.Report: Layer 7 increasingly under DDoS gunA new report shows an upward trend where attack tools exploit layer 7 to maximize the impact of DDoS assaults. Here’s what you can do to blunt the threat.With botnets everywhere, DDoS attacks get cheaperCyber-crime just doesn’t pay like it used to.How a bookmaker and a whiz kid took on a DDoS-based online extortion attack”Facing an online extortion threat, bookmaker Mickey Richardson bet his Web-based business on a networking whiz from Sacramento who first beat back the bad guys, then helped the cops nab them.Security experts scramble to decipher Twitter attackFacebook exec claims Twitter, Google and others were attacked to silence pro-Georgian activist.CSO Senior Editor Bill Brenner launches a series on distributed denial-of-service attacks. Here, he interviews Andy Ellis, CSO of Akamai. Given the nature of the business, when a denial-of-service attack is in progress or being attempted, Akamai is among the first to see and respond to it.Evolution of DDoS: Why it’s only getting worseCSO Senior Editor Bill Brenner talks to Breach Security application research director Ryan Barnett about the shift in tactics attackers are using to deepen the damage their DDoSes can inflict. Related content news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Regulation Government news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe