Dispelling the myths behind DDoS attacks
Distributed Denial of Service (DDoS) attacks are quickly becoming the preferred method for cyber attackers to wreak havoc on the internet. With a recent spate of attention …
DDoS attacks are becoming more effective
Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …
State of the Internet: Trends impacting online business
Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic …
Code hosting Code Spaces destroyed by extortion hack attack
Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of …
Winning the war on web stealth attacks
The “National Strategic Assessment of Serious and Organised Crime 2014”, published in May by the UK National Crime Agency, listed DDoS as a major concern for …
DDoS attacks: Criminals get stealthier
There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these …
Spike in DDoS attack size driven by NTP misuse
The beginning of 2014 saw 1.5 times the number of attacks over 20GB/sec, compared to the rest of 2013, according to new stats released by Arbor Networks today. At the …
XSS bug in popular Chinese site exploited to launch DDoS attack
DDoS mitigation firm Incapsula has put a stop to the speculations that the video content provider whose vulnerable website was misused to launch a DDoS attack was YouTube, and …
DrDoS attacks to reach 800 Gbps in 2015
While the network time protocol (NTP) DrDoS threats that became prevalent in early 2014 have been contained, new distributed reflected denial of service threats will lead to …
Dissecting the unpredictable DDoS landscape
DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and …
Attackers use reflection techniques for larger DDoS attacks
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification …
Blocking DDoS attacks with a cloud-based solution
In this interview, Jag Bains, CTO of DOSarrest, talks about various types of DDoS attacks and why a cloud-based solution is a good fit for most organizations. Despite being an …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege