Latest news with #Denial


Techday NZ
08-08-2025
- Business
- Techday NZ
DDoS attacks surge 364% in APAC, driven by AI & hacktivists
Radware has reported a significant escalation in Distributed Denial of Service (DDoS) attack activity across the Asia-Pacific (APAC) region, with average attack volumes increasing by 364% compared to the previous year. The data from Radware's threat intelligence research, which encompasses information from the company's cloud and managed services along with publicly available data from the Telegram messaging platform, provides a detailed overview of recent trends and targets in network and application-based cyberattacks. Sharp escalation According to the company, the frequency and intensity of DDoS incidents are outpacing previous years in the region. Kenichiro Sasaki, Country Manager for Radware in Japan, noted the changing landscape of threats facing organisations: "Across APAC, there has been a sharp escalation in the frequency and intensity of cyberattacks and DDoS incidents are leading the charge. Multiple catalysts are driving the threat revolution, including geopolitical conflicts, bigger and more complex threat surfaces, and more sophisticated and persistent threats. Add to that the impact of Al, which is lowering barriers to entry, and what you have is a highly dynamic threat environment that demands equally dynamic defense strategies." The company's analysis reveals that, from 2023 to 2024, the average number of network DDoS attacks per customer increased by 72%. Service providers were the primary targets, receiving 55% of the attack volume, while the technology and gaming sectors followed with 21% and 11% respectively. Network-layer and application-layer attacks Network-layer DDoS attacks have increased threefold in average size during this period. Concurrently, Layer 7 (application-layer) DNS DDoS attacks have also grown considerably, with the number of DNS flood queries and malicious DNS volumes both rising by 93% over the previous year. The manufacturing sector was most impacted by these DNS flood activities, accounting for 43% of the malicious queries, while telecom and energy sectors comprised 40% and 14% respectively. Radware's research indicates that the broadening digital infrastructure in APAC, coupled with persistent global tensions and the emergence of advanced AI capabilities, are increasing the region's susceptibility to a diverse range of cyber threats. Hacktivist campaigns intensify Hacktivist-led cyberattack campaigns have maintained their momentum globally and regionally, with targeted DDoS attacks surging in response to ongoing political and ideological unrest. Data gathered from Telegram indicates a 20% global rise in hacktivist-claimed attacks between 2023 and 2024. Within APAC, India emerged as the most targeted country with 761 claimed attacks, followed by Indonesia with 614, Taiwan with 281, Thailand with 220, and Bangladesh with 188. The report identifies government institutions as the most commonly targeted group among hacktivists in the region, accounting for 17% of the activity. This was followed by the education sector at 12% and the finance sector at 9%. The threat actor known as Executor DDoS was the most active in APAC, laying claim to 513 DDoS attacks. This was followed by RipperSec with 467 attacks and NoName057(16) with 362 attacks. Industry perspectives The findings reflect broader industry concerns regarding the increasing complexity of cyberattacks and the involvement of AI, which is perceived as reducing the technical barrier of entry for attackers and enabling more frequent and complex campaigns. As the threat landscape evolves, the need for adaptable and advanced defensive strategies is highlighted across affected sectors such as service providers, technology, gaming, manufacturing, telecoms, and energy. Radware's intelligence underscores the ongoing challenges facing APAC organisations as they address the growing risks and implement strategies aimed at safeguarding their digital operations against a changing backdrop of cyber threats.


Local Germany
31-07-2025
- Politics
- Local Germany
Auschwitz museum launches tool to fight Holocaust denial
The "Stop Denial" online tool helps individuals debunk common denialist arguments using "documents, photographs, witness accounts or the results of historical research", said the Auschwitz museum in southern Poland. It includes a manual instructing users to respond to denialist content on social media by commenting on posts with a link to the "Stop Denial" website. The museum cites examples of false claims it aims to debunk, such as statements like "Official documentation lacks information about the extermination at Auschwitz" and the "International Red Cross raised no objections after visit to camp". Museum director Piotr Cywinski said in a statement that in the past "few could look into the eyes of the living survivors and say in cold blood that all their testimonies were lies". "Today, there are few left. So anti-Semitic, xenophobic, populist voices are rising up," he added. Museum spokesman Bartosz Bartyzel said the launch of the campaign follows a "surge of negationist activity" across social media and in public discourse. "The best solution, help, rescue for disinformation is information," he told AFP. Earlier this month, MEP Grzegorz Braun -- a candidate in this year's Polish presidential election who garnered more than six percent of the vote -- claimed in a radio interview that "Auschwitz with gas chambers is unfortunately fake". In May, the museum warned against Facebook posts featuring AI-generated fictional images of camp victims. The museum has long used its social media accounts to share authentic victim photos and information to raise Holocaust awareness. READ ALSO: German Holocaust remembrance under fire from German far right Advertisement Nazi Germany built the death camp in the city of Oswiecim after occupying Poland during World War II. The Holocaust site has become a symbol of Nazi Germany's genocide of six million European Jews, one million of whom died at the camp between 1940 and 1945. More than 100,000 non-Jews also died at Auschwitz-Birkenau, including non-Jewish Poles, Roma, and Soviet soldiers.


News18
24-06-2025
- Politics
- News18
How A Cyber Storm That Tried To Cripple India's Top Offices During Op Sindoor Was Crushed
Last Updated: The cyber onslaught, aimed at overwhelming and crashing India's top digital infrastructure, primarily originated from China, Pakistan and some other areas located in the Gulf The websites of a top Indian constitutional office faced over a 100-fold surge in DDoS (Distributed Denial of Service) attacks during the recent conflict between India and Pakistan, with the cyber-attacks being primarily traced to some regions of China and Pakistan, News18 has learnt. MeitY (Ministry of Electronics and Information Technology), along with other agencies, formed special teams and swiftly deployed advanced cyber-defence systems to neutralise the threat in real time to make the websites functional. According to sources in the government, the cyber onslaught, aimed at overwhelming and crashing India's top digital infrastructure, primarily originated from China, Pakistan and some other areas located in the Gulf. Such activities triggered a high alert across agencies, leading to the deployment of MeitY's advanced cyber-defence systems, equipped with next-gen firewalls and real-time threat neutralisation protocols. A senior officer, who is part of the special team, told News18: 'The attack was not just significant in scale but also in intent and timing. The attacks were strategically launched to disrupt critical digital infrastructure amid a high-stakes national security operation." Top cyber-intelligence sources added that the flood of fake traffic originated predominantly from two geopolitical hotspots. Both neighbouring regions were identified as the primary source of botnet-driven requests that targeted sites in an attempt to render them inaccessible to legitimate users. 'These were not isolated pings. The attack was persistent, coordinated, and sustained over several days," the officer added. The DDoS attack functions by overwhelming a server, website, or the network with a relentless stream of requests until the system is slowed down, or becomes unresponsive, and in the process, crashes entirely. In this case, the intensity of the attack forced the government's cyber security agencies and MeitY to deploy its cutting-edge defensive cyber protocol, activating high-grade firewall barricades and AI-enabled threat filters to neutralise incoming malicious traffic. 'Attack vectors were identified, analysed and isolated systematically. What could have been a full-blown digital blackout was prevented by swift deployment of our real-time cyber shield," a senior cyber official confirmed. Sources also revealed that India's National Critical Information Infrastructure Protection Centre (NCIIPC) was alerted, and counter-intrusion strategies were put in motion immediately after unusual traffic patterns were flagged. The PMO servers, fortified under Level-5 digital protection protocols, held steady due to rapid mitigation steps—but the scale of the attack has raised serious concerns about state-backed cyber warfare tactics being employed to coincide with India's internal security operations. This marks one of the most coordinated digital offensives targeting a top-level Indian government site in recent months. The timing—coinciding with Operation Sindoor's execution phase—is not viewed as a coincidence by officials. India's cyber agencies are now in the process of tracing the botnet networks, identifying compromised global nodes, and mapping the larger architecture of hostile cyber command centres. Preliminary indicators suggest that this was more than just digital mischief—it was a strategic attempt to distract, disrupt, and disable. First Published: June 24, 2025, 10:16 IST


CTV News
13-06-2025
- Entertainment
- CTV News
Local artist unveils new piece in Sandwich Town
Denial's mural in Sandwich Town seen in Windsor, Ont. on June 12, 2025. (Bob Bellacicco/CTV News Windsor) Local artist, Daniel Bombardier, known as 'Denial', was seen finishing up his latest art piece in Sandwich Town. It is a welcome piece that was commissioned by Sandwich Town BIA. 'I haven't done a lot of stuff down here, but I grew up right around here, just around Mic Mac Park,' said Bombardier. 'We just finished one over on College, and the next one we're doing is the Victoria Tavern. That's the one I can't wait for.' The mural highlights prominent figures from Sandwich's rich past, offering a bold and artistic nod to its history.


Express Tribune
15-05-2025
- Politics
- Express Tribune
Security sources reveal details of Pakistan's massive cyberattack against India
Security sources have shared details regarding major cyber counter-offensive by Pakistan, under Operation Bunyanum Marsoos, launched in response to Indian aggression, targeting key infrastructure sectors across India. The cyber wing of Pakistan's armed forces was 'actively involved' in the operation, inflicted significant disruptions across multiple Indian domains, including power infrastructure and petroleum systems, they added. Security sources reavealed that the Pakistani cyber team caused severe damage to Indian communications, disabling official government emails and the OTP infrastructure, adding that the national communications suffered heavy disruption. Read More:Pakistan and India agree to immediate ceasefire Sources confirmed that India's surveillance systems were also reportedly compromised. Hackers destroyed communication hardware and defaced numerous Indian websites, they added. Servers at Indian airports were taken down, impacting the Indian Air Force's communications and interrupting railway systems across several regions, sources further revealed. They said the Pakistani team gained access to India's national, eastern, northern, and western load dispatch centres, temporarily disabling systems, adding that the breach cut electricity to approximately 80% of Indian consumers for a limited period. According to internal reports, over 4,600 power feeders in Maharashtra, 3,600 in Uttar Pradesh, and more than 600 in Indian Illegally Occupied Jammu and Kashmir (IIOJK) were hacked and disconnected. In Indian Punjab, two AI-powered servers at the load dispatch centre were disabled. Meanwhile, in Karnataka, more than 235 solar and wind grid stations were hacked and rendered inoperative. Read More:Pakistan downs five Indian fighter jets in retaliation for India's missile attack Sources shared that the databases of Hindustan Petroleum Corporation Ltd. (HPCL) and Indraprastha Gas Ltd (IGPL) were also targeted. Over 4,400 government and public-sector communication routers were also brought down, they added. Sources further revealed that a large-scale Distributed Denial of Service (DDoS) attack was launched on major Indian government, military, air force, stock exchange, and public-sector servers. The attack paralysed internal communications and email/OTP workflows. 'More than 3,500 CCTV cameras installed in government buildings, hospitals, highways, and public zones were also reportedly hacked,' they added. In Indian Illegally Occupied Jammu and Kashmir (IIOJK), over 250 key ISP routers were compromised, resulting in localised internet outages, sources said. The operation accessed and extracted data from over 90 government and corporate sector websites, including those belonging to the Indian Air Force, Hindustan Aeronautics Ltd, Border Security Force, Unique Identification Authority of India, and Indian Railways. Moreover, airport servers in Mumbai, Delhi, and Kolkata were among those hacked, sources stated. The Indian Air Force's communication systems across its northern, southern, and western commands were disrupted while Indian Railways also experienced operational delays due to compromised servers. Read More: Pakistan Army announces conclusion of Operation Bunyanum Marsoos Pakistan Armed Forces conducted Operation Bunyanum Marsoos on May 10 as part of the military conflict 'Marka-e-Haq' in response to Indian military's dastardly attacks that began on the night of May 6 and 7, resulting in the loss of innocent civilian lives, including women, children, and the elderly. Pakistan deployed its Al-Fatah missile and targeted multiple Indian military installations. However, after the intervention of US President Donald Trump, a full and immediate ceasefire was reached between India and Pakistan. PAF also shot down at least five indian jets in response to unprovoked aggression and airspace violations. According to the military spokesperson, the aircraft shot down included three Rafale jets, one MiG-29, one SU-series aircraft, and an Israeli-made Heron combat drone. The jets were downed in multiple locations, including Bhatinda, Jammu, Akhnoor, Srinagar, and Avantipur. A full and immediate ceasefire between India and Pakistan was announced on May 10, following days of heightened military exchanges that brought the two nuclear-armed neighbours to the brink of war. Read More: PM Shehbaz confident IWT, Kashmir issues with India will be resolved The announcement was first made by US President Donald Trump and later confirmed by Pakistan's Prime Minister Shehbaz Sharif, Deputy Prime Minister Ishaq Dar, Indian External Affairs Minister S. Jaishankar, and US Secretary of State Marco Rubio. Tensions escalated between India and Pakistan after the Pahalgam attack in IIOJK. India blamed Pakistan-based elements without presenting any evidence, while Islamabad rejected the allegations. In response, India closed the Wagah border, revoked visas, and suspended the Indus Waters Treaty — moves Pakistan called an 'act of war.' Following diplomatic intervention led by Washington, both sides agreed to halt military activity across land, air, and sea. However, hours after the truce, fresh skirmishes were reported on both sides of the Line of Control.