Check Point Blog

Threat Research May 20, 2015

Storm Kit – Changing the rules of the DDoS attack

Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. It’s easy, cheap and difficult to trace, and “service providers” can be found throughout the “dark” Web. As a result,…

Read More