Follow

@michellelollie Not really - they can be anything from identifying a vulnerability in a particular service which causes it to shut down or become swamped to simple floods of traffic to unmonitored services. The latter typically requires some form of asymmetric behavior on the server in order for a single system to manage to take the service/system offline -- something like a time/resource intensive database search, etc.

They're an extremely broad category of attack.

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.