toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#ddos

3 posts2 participants0 posts today

Trotz internationaler Polizeiaktion weitet die prorussische Hackergruppe NoName057(16) ihre DDoS-Angriffe auf deutsche Ziele aus. Betroffen sind Behörden, Unternehmen und kritische Infrastruktur in zahlreichen Städten wie Kiel, Dortmund & Berlin. Ziel: Einfluss auf Politik & Gesellschaft. 🚨💻🇩🇪 #CyberAttack #NoName05716 #Deutschland #DDOS #CyberSecurity golem.de/news/trotz-polizeiakt
#newz

Golem.de · Trotz Polizeiaktion: Prorussische Hacker weiten Angriffe auf Deutschland aus - Golem.deBy Marc Stöckel

DDoS-атака
1. Одна человеческая клетка содержит 75Мб генетической информации
2. Один сперматозоид содержит 37.5Мб.
3. В одном миллилитре содержится около 100 млн сперматозоидов.
4. В среднем, эякуляция длится 5 секунд и составляет 2.25 мл спермы.
5. Таким образом, пропускная способность мужского члена будет равна:
(37.5Мб x 100M x 2.25)/5 = (37 500 000 байт/сперматозоид x 100 000 000 сперматозоид/мл x 2.25 мл) / 5 секунд = 1 687 500 000 000 000 байт/секунду = 1 687.5 Терабайт/с
Получается что женская яйцеклетка выдерживает эту DDoS-атаку на полтора терабайта в секунду, пропуская только один выбранный пакет данных и является самым офигенным в мире хардварным фаерволом...
Но тот один пакет, который она пропускает, кладёт систему на 9 месяцев...

Sure! Here's the English version of your post with categories and hashtags:
🔐 DDoS vs. Biology
**The human egg is the world’s most advanced hardware firewall.**
Incoming data stream: **1.7 TB/sec**,
Only **one packet** gets through — and it **crashes the system for 9 months.**
📌 Categories:
#Cybersecurity
#Biotech
#InfoSec
#Science
#DDoS
#TechHumor
#Bioinformatics
#Genetics
#Engineering
#NerdJokes
Let me know if you'd like it turned into a visual card, carousel, or meme graphic!

So my first evil genius robot honeypot, the word frequency one, seems to be getting hit by a distributed botnet.

It started around 2-3 requests per second but seems to be ramping up.

It's using IP addresses from all over the world - could be hacked personal devices? - and a wide range of plausible-looking User Agent strings.

My server is fine for now - 95% idle CPU.

Are there people for whom any of the IP or agent data might be useful? Botnet detectorists?

#Kyiv Independent suffers #DDoS attack after publishing criticism of anti-corruption rollback

Attack reached over 10k requests/second & targeted key parts of website

It followed publication of #critical #editorial & in-depth coverage of the government’s push to expand the prosecutor general’s control over the National #Anti-Corruption Bureau (NABU) & Specialized Anti-Corruption Prosecutor’s Office (SAPO).

kyivindependent.com/kyiv-indep

The Kyiv Independent · Kyiv Independent suffers DDoS attack after publishing criticism of anti-corruption rollbackBy Tim Zadorozhnyy
#Ukraine#NABU#SAPO

Thursday, July 24, 2025

Fire engulfs iconic Odesa market amid Russian attack — China covertly supplying drone engines to Russia despite sanctions, Reuters reports — Over half of MPs suspected by NABU backed law curbing anti-corruption agency’s independence — Ukrainian soldiers slam Zelensky’s anti-corruption crackdown … and more

activitypub.writeworks.uk/2025

Threat Actors Exploit Linux SSH Servers with SVF Botnet

Cybersecurity researchers have uncovered a new attack campaign in which threat
actors are targeting Linux SSH servers with weak credentials to deploy the, SVF
botnet a Python based DDoS malware. This botnet uses Discord as its command-
and-control (C2) platform allowing attackers to manage infected servers in real
time. The SVF botnet is capable of launching Layer 7 (HTTP flood) and Layer 4
(UDP flood) DDoS attacks turning compromised servers into powerful tools for
disrupting targeted systems.

Pulse ID: 6880a810b601758421acd5a4
Pulse Link: otx.alienvault.com/pulse/6880a
Pulse Author: cryptocti
Created: 2025-07-23 09:14:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Russisches DDoS Botnet abgeschaltet

Das BKA meldet einen Erfolg gegen politisch motivierte Cyber-Kriminalität. Weitere Sekundär-Meldungen gibt es beispielsweise hier oder hier. Die russische Formation NoName057(16) hat ihr gleichnamiges Botnet nur für DDoS-Angriffe benutzt - soweit wir bisher wissen. Die Angriffe richteten sich gegen "unliebsame"

pc-fluesterer.info/wordpress/2

www.pc-fluesterer.infoRussisches DDoS Botnet abgeschaltet | pc-flüsterer bremen

Wer sich hinter NoName057(16) verbirgt

"Manuel Atug, @AG_KRITIS : Was ist ein #DDos-Angriff?

DDos-Angriff funktionieren über sehr viele Serversysteme, die sehr groß ans Internet angebunden sind...

Wird das neue Sicherheitsgesetz #NIS2 die #Behörden künftig in die #Absicherungspflicht nehmen?

Atug: Die meisten Behörden und öffentlichen Einrichtungen haben (DDos-Angriffe) unzureichend adressiert, weil es keine rechtlichen Vorgaben gibt..."
mdr.de/nachrichten/deutschland

MDR · Angriff auf die Infrastruktur: Wer sich hinter NoName057(16) verbirgtBy Anja Neubert, MDR AKTUELL