Posts

Showing posts with the label hiragana

Unusual Traffic, Unexpected Chaos: The Truth Behind the Cloudflare Outage

Image
Cloudflare's Global Outage: Understanding the Root Cause Behind the September 18 Network Disruption On 18 September, the world witnessed a sudden and widespread slowdown of the internet. Websites and applications depending on Cloudflare ranging from social networks to API driven platforms began returning Internal Server Error messages. Millions of users assumed it was a cyberattack, a DDoS event, or a breach. However, the truth behind the outage was far more nuanced and rooted in Cloudflare’s internal architecture. This blog breaks down what Cloudflare does, why bot mitigation plays a critical role, how an unexpected configuration file led to an internal service crash, and why “unusual traffic” triggered a global ripple. What Cloudflare Really Does for the Internet Cloudflare is more than a simple CDN or firewall it is a massive reverse-proxy network that sits between users and websites. It accelerates content delivery, filters malicious traffic, provides DNS services, manage...

Sometime slash might be Unicode Hiragana

Image
Cybercriminals Exploit Unicode Trick to Mimic Booking.com in Phishing Scam Threat actors have launched a new phishing campaign targeting Booking.com users , leveraging Unicode characters to disguise malicious links as legitimate ones. This attack shows how easily scammers can trick people with subtle visual deceptions. How the Attack Works The campaign uses the Japanese hiragana character “ん” (Unicode U+3093) inside phishing URLs. On some systems and fonts, this symbol looks like a forward slash (/) or part of a subdirectory, making the fake URL appear genuine. For example, a phishing email may display the link (appears safe but is deceptive): https://admin.booking.com/hotel/hoteladmin/... But the actual malicious hyperlink is different (neutralized below for safety): https://account.booking.comんdetailんrestric-access.www-account-booking[.]com/en/ At first glance, it looks like a real Booking.com page. In reality, the true registered domain is “www-account-booking[.]co...