DDoS - Disrupting Mobile Users via CGNat




State of DDoS - Summary




DDoS as Attackvector for State-Sponsored/Hacktivist-Groups in Times of Crisis




IPv6 - DDoS, an underrated attackvector




DDoS-Sniper: sophisticated attacker analyzed




Log4Shell - Scanning: Lessons learned




GCP Loadbalancer DDoS-Protection Best Practice




DDoS Incidents Logbook




Security Incidents Logbook - 2021




Street prices for DDoS-Attacks




Juicy Open Ports for Recon and Pentests




Fancy Lazarus DDoS-Erpressergang in DACH-Region gesichtet




Ransomware Operations Part 1 - Intro




Ransomware Operations Part 2 - Vorgehen und Verfahren




Ransomware Operations Part 3 - Protection




Ransomware Operations Part 4 - Addendum Referenzen




Cobaltstrike-Beacons analyzed




Analysing the DDOS-Threat-Landscape, Part 2: DDoS-Size over Time (Botnet, Volume, Max-Values)




Scanning for Exchange - Exploitation/Webshells (CVE-2021-26855 ProxyLogon)




Centreo - another Supply-Chain-Attack




DDoS Resiliency Score (DRS) updates based on attacker-capabilities




Security Incidents Logbook-EN




Zerologon (CVE-2020-1472) finding and checking




Analysing the DDOS-Threat-Landscape, Part 1: UDP Amplification/Reflection




Security weakend by Complexity