<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTP-2 Rapid Reset - Distributed Denial of Service in Threats</title>
    <link>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63517#M932</link>
    <description>&lt;P&gt;How widely used is HTTP2?&amp;nbsp; I think this was the first time I'd heard the term.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, Amazon doesn't share much details, but they did &lt;A href="https://aws.amazon.com/blogs/security/how-aws-protects-customers-from-ddos-events/" target="_blank" rel="noopener"&gt;write up a response to the event&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Oct 2023 12:22:10 GMT</pubDate>
    <dc:creator>ericgeater</dc:creator>
    <dc:date>2023-10-11T12:22:10Z</dc:date>
    <item>
      <title>HTTP-2 Rapid Reset - Distributed Denial of Service</title>
      <link>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63512#M931</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A new DDoS (distributed denial of service) technique named 'HTTP/2 Rapid Reset' has been actively exploited as a zero-day since August, breaking all previous records in magnitude.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;News of the zero-day technique comes as a coordinated announcement today between Amazon Web Services, Cloudflare, and Google, who report mitigating attacks reaching 155 million requests per second (Amazon),&amp;nbsp;201 million rps (Cloudflare), and a record-breaking 398 million rps (Google).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Google says they were able to mitigate&amp;nbsp; these new attacks by adding further capacity on the edge of their network.&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/" target="_blank" rel="noopener"&gt;https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/&lt;/A&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Regards&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 23:53:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63512#M931</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-10T23:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP-2 Rapid Reset - Distributed Denial of Service</title>
      <link>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63517#M932</link>
      <description>&lt;P&gt;How widely used is HTTP2?&amp;nbsp; I think this was the first time I'd heard the term.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, Amazon doesn't share much details, but they did &lt;A href="https://aws.amazon.com/blogs/security/how-aws-protects-customers-from-ddos-events/" target="_blank" rel="noopener"&gt;write up a response to the event&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 12:22:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63517#M932</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2023-10-11T12:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP-2 Rapid Reset - Distributed Denial of Service</title>
      <link>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63541#M933</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;Dark Reading has also issued a follow up too and explanation:&amp;nbsp; Along with CVE details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event" target="_blank"&gt;https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 23:15:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/HTTP-2-Rapid-Reset-Distributed-Denial-of-Service/m-p/63541#M933</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-11T23:15:26Z</dc:date>
    </item>
  </channel>
</rss>

