An Additional Compilation of Attack Maps (Including a Tool to Build Your Own)
Finally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and
Read moreFinally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and
Read more03/09/2015 Updated with the Akamai Attack Map Big data analysis has become a very powerful weapon in the hands of
Read moreAs an ideal follow-up of my old post A (Graphical) World of Botnets and Cyber Attacks, I would like to mention a
Read moreUpdate 3/12/2013: I should also mention the Deutsche Telekom Security Tachometer We live in a World made of Botnets and cyber
Read moreThis morning, during my usual virtual promenade through my feeds, I came across a really interesting post from Stratsec, a
Read moreThe attack model based on botnet-generated Distributed Denials of Service is opportunistic. The botmaster selects a target, gathers as many
Read more