Tag

network attack

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Information SecurityTaiwan hacker groupcybersecurity
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

Incident ResponseInformation Securitychina
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
Selected Java Interview Questions
Selected Java Interview Questions
Jan 2, 2022 · Information Security

Understanding TCP/IP Protocol Layers and Common Network Attacks (ARP Spoofing, DoS, DNS)

The article explains how increasing network attacks such as ARP spoofing, DoS, and DNS hijacking exploit vulnerabilities in the four TCP/IP layers, describes their mechanisms, impacts, and defensive measures, and highlights the importance of packet analysis for security.

ARP SpoofingDNSDoS
0 likes · 11 min read
Understanding TCP/IP Protocol Layers and Common Network Attacks (ARP Spoofing, DoS, DNS)
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2018 · Information Security

Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services

Tencent Cloud mitigated a 31‑minute, 194 Gbps hybrid DDoS attack on a cloud gaming service that combined typical SYN/ICMP floods with a rare TCP‑reflection component sending spoofed SYN/ACK packets to common service ports, primarily from Chinese IDC servers, prompting advanced filtering and cloud‑based mitigation recommendations.

Cloud SecurityDDoSTCP reflection
0 likes · 10 min read
Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services