Tag : DDOS


What’s HOT in Application Security Vol #36

Nov 13, 2012 By asaphs | EU Official hacked at an Internet Security Conference
A European Union Official has come out in a statement which declared that her staff was hacked when they attended an internet Security conference last month in Azerbaijan. EC Vice President Neelie Kroes, released a statement about the ironic hack in her blog last week, where she went into further detail to explain the scope of what happened and how her and her employees computers were compromised at a meeting of the Internet Governance Forum in Baku.

</Read More>

What’s HOT in Application Security Vol #34

Oct 30, 2012 By asaphs | Foreign Hacker Steals 387,000 Credit Card Numbers From South Carolina’s Department of Revenue
A foreign hacker has managed to steal nearly 400,000 credit and debit card numbers as well as 3.6 million Social Security numbers from the South Carolina’s Department of Revenue. While most of the stolen credit card details were encrypted, 16,000 had no encryption whatsoever.

</Read More>

What’s HOT in Application Security Vol #33

Oct 22, 2012 By asaphs | Muslim Hacker Group Attack US National weather Service
A Hacking group from Kosovo calling themselves the Hackers Security group have released sensitive hacked data from the US National weather service. The stolen information included, files from the web server and other sensitive data that could be used for a later attack.

</Read More>

What’s HOT in Application Security Vol #28

Sep 12, 2012 By asaphs | Web hosting company GoDaddy hacked
GoDaddy, the web hosting service provider was hacked on Monday by a supporter of Anonymous, a self-proclaimed group of rogue hackers. The attack also affected many of GoDaddy’s customers. The attack caused GoDaddy and many of the company’s 10.5 million customer’s web sites to go down for several hours on Monday afternoon. The person behind the attack claimed that the GoDadddy and its affiliated sites collapsed under a flood of traffic caused by a DDoS attack.

</Read More>

What’s HOT in Application Security Vol#26

Aug 27, 2012 By asaphs | Microsoft vulnerable to VPN attack
Microsoft’s MS-CHAP v2 (Microsoft Challenge Handshake Authentication Protocol version 2) which is used to authenticate users in PPTP-based (Point-to-Point Tunneling Protocol) VPNs has been shown to be vulnerable to hacks according to reports from the recent Defcon conference.

</Read More>

What’s HOT in Application Security Vol #25

Aug 20, 2012 By asaphs | WikiLeaks crippled by DDoS attacks
A group who call themselves AntiLeaks has claimed responsibility for the crippling hack on the famous site WikiLeaks and its founder Julian Assange.  WikiLinks claimed that that their servers were attacked by 10 Gbps of false traffic per second. The attack was also reported to be a sustained one lasting a total of 9 days. If this is true, it may also have been one of the longest sustained DDoS attacks on record.

</Read More>

What’s Hot in Application Security Vol #21

Jul 23, 2012 By asaphs | DARPA funded hacking device ready for release
The Defense Advanced Projects Research Agency (DARPA) has just finished funding a new device called The Power Pwn. The new device which is cunningly concealed as a regular power strip is anything but! The new device is actually a Hacking tool for launching remotely-activated WI-Fi, Bluetooth and Ethernet attacks.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.