Well, also there status page is down:
#spotify #statuspage
#ddos by its users
Well, also there status page is down:
#spotify #statuspage
#ddos by its users
I have just taken the time to thoroughly read the following article
This article has led me to the conclusion that an Open{source} War will have to be waged against LLM large language model abusers of data collection.
The work of these bots is pure DDoS denial of service. An interesting set of offensive tools have been programmed and are already implemented. They have proven to be quite effective and are being refined into sophistication to literally work to knock these networks of bots offline, in a DOT MMORPG approach.
It is unthinkable that LLM bots steal our Open Source resources servers bandwidth and financial cashflow without serious repercussions!
WTF are LLM companies thinking? Even Meta has waged war against us!
LLM has waged a brutal war.
The Open Source Community is responding; even those at The Dark Side of the internet are making tools to assist everyone against Artificial Intelligence LLM DDoS attacks, which knock whole Open Source Networks offline, as we speak.
It doesn't matter if in the end it looks like a Terminator landscape globally on the IT scale. Open source will win. LLM will disappear...
Via #LLRX @psuPete Recommends Weekly highlights on cyber security issues, 4/12/25 5 highlights - #Biometrics vs. #passcodes: What lawyers recommend if you’re worried about #warrantless phone searches; #DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns; #Google Maps doubles down on preventing fake reviews; Large number of US adults view #AI as a threat: Report; Explosive Growth of Non-Human Identities Creating Massive #Security Blind Spots https://www.llrx.com/2025/04/pete-recommends-weekly-highlights-on-cyber-security-issues-april-12-2025/ #privacy
Just wanted to share some thoughts on #RFC9715 - an #RFC that defines standards on reducing the #DNS issue of IP fragmentation over #UDP. It's not a long read, but a good one for everyone who understands the issues of large UDP responses on the #Internet. A great leap forward to (hopefully) reduce the reflection/amplification #DDoS potential of DNS.
Just today I learned that #Google will configure their public DNS resolvers to limit to ~1400 bytes (smaller adjustments expected while figuring out the sweet spot in production). From now on, DNS responses which exceed this limit will have the truncated flag set instructing the client to resolve back to #TCP.
New scraped proxy list for MegaMedusaL4, get full IP : https://www.minimedusa.lol/ip/current-scrapedL4.txt or cleaned IP : https://www.minimedusa.lol/ip/current-scraped-cleanedL4.txt - #ThreatIntel #Ddos #MegaMedusa
Open source devs are fighting AI crawlers with cleverness and vengeance
—@TechCrunch
「 It’s intended to “slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect ‘no crawl’ directives,” Cloudflare described in its blog post. Cloudflare said it feeds misbehaving AI crawlers “irrelevant content rather than extracting your legitimate website data.” 」
ActivityPub ist super, um dein WordPress-Blog zum Fediverse zu verbinden. Je nach Aktivität kann es jedoch sein, dass du einen versehentlichen DDoS gegen deinen eigenen Server verursachst.
[…]
https://epiph.yt/blog/2025/das-activitypub-plugin-und-der-versehentliche-ddos/
I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed
(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)
Has anyone else been seeing this and do you have an idea what's behind it?
So apart from the attempt to open a lot of Facebook accounts using my domain, my site has also been under sporadic DDoS attacks. I hope you don't have too much trouble connecting at times.
And no, I have no idea who I ticked off now.
Nachdem diverse #ki #ai #crawler besonders respektvoll mit den öffentlichen Ressourcen von Open Source Projekten umgehen, habe ich mich dazu entschlossen eben diese auszusperren. Wir hatten in der Vergangenheit crawls, die im #monitoring als #ddos gewertet wurden.
Diverse AS erfreuen sich nun einem dauerhaften 429, einige wenige die es für alle kaputt machen…
@Prozak @seanfobbe Lets say @Codeberg did suffer some serious #DDoS (which OFC isn't their fault) so I'd rather see #SelfHosting as a better option...
It's just.currently.not.my.priority, but *my.priorities.ain't authoritative...
@seanfobbe personally I'd consider #gitea and #SelfHosting.
Once any of my projects would gain traction I'd move from there away.
I jist move to either SelfHosting or nowhere...
Managing AI Bots+ w/ Apache MPM, FPM, & Fail2Ban: https://tech.haacksnetworking.org/2025/04/06/managing-ai-bots-w-apache-mpm-fpm-fail2ban/ There's been a lot of continued discussion on this topic, so I decided to investigate some of the common reports, compare those to my own hardware, theoretical ceilings and caps, and then adjusted my LAMP stack and fail2ban as per this blog entry. Let me know what yall think or if you find any errors or questionable claims. -oemb1905 #ai #scraping #apache #opensource #freesoftware #floss #ddos #php
The Dutch web hosting company Argeweb has experienced performance issues for over a week now.
DNS Flood Attack vs. DDoS
A DNS Flood Attack targets DNS servers specifically, whereas a DDoS Attack can target any online service. Understanding the distinction is key to building stronger defenses!
Join our Cyber security training Course -
https://infosectrain.com/cybersecurity-certification-training/
@LunaDragofelis Consider #blackholing entire #ASN|s like #aws and all the ofther #GAFAMs instead.