Figure 1 showing SSDP DDoS attacks against Eastern European service provider observed in A10 Defend Threat Control

Carpet-bombing Attacks Highlight the Need for Intelligent and Automated DDoS Protection

| | Cyber Security
Recently a large service provider in Eastern Europe contacted the A10 threat research team for insight into a series of DDoS attacks against its network. While the attacks were not service impacting, the frequency and persistence of the attacks raised internal concerns that the attacks might mask a more malicious ... Read More

The Imperative Need for Consolidation in Web App Security and Delivery

In today’s rapidly evolving digital and cyber landscape, securing and delivering applications efficiently is crucial for businesses of all sizes. The pursuit of uninterrupted service is no longer the only focus. Security concerns have taken center stage, transforming the landscape into a battleground where the slightest disruption triggers a search ... Read More

A10 Defend Threat Control: DDoS Defense Reimagined

An addition to the A10 Defend suite has arrived. A10 Defend Threat Control, a necessary and proactive DDoS intelligence SaaS platform, is here to establish and amplify your holistic DDoS defense system. Backed by A10’s proprietary “zero-atrophy” data gathering and validation method, Threat Control provides actionable insights and proactively establishes ... Read More
Figure 1. Attack Types

Insight Into the DDoS Attacks on the French Government

The attacks are ongoing as of this writing. Here are a few screenshots of data and some insight. I’ll make sure to keep it brief since you have seen this news in various outlets. Our sensors began receiving attack traffic at 18:00 GMT Sunday, beginning with an ARD/ARM attack and ... Read More

Latest Vulnerability Triggers Record-breaking DDoS Attacks

| | Cyber Security, technology
A10 Defend Helps Customers Navigate this Rapidly Evolving DDoS Threat Landscape Distributed denial of service (DDoS) attacks have consistently been a chief concern of security teams. However, common misconceptions still exist. Some view that DDoS attacks are merely nuisances or inconveniences – that they are volumetric and straightforward to defend ... Read More

Protecting Systems from the New HTTP/2 Rapid Reset Vulnerability

| | Cyber Security, technology
The A10 Networks threat research team has investigated the HTTP/2 rapid reset vulnerability (CVE-2023-44487), which has been identified in recent days and has advised customers on the best ways to mitigate it in their network. The HTTP/2 rapid reset vulnerability (CVE-2023-44487) leverages the characteristics of the HTTP/2 protocol. Unlike HTTP/1.1, ... Read More

Protecting Systems from the New HTTP/2 Rapid Reset Vulnerability

| | Cyber Security, technology
The A10 Networks threat research team has investigated the HTTP/2 rapid reset vulnerability (CVE-2023-44487), which has been identified in recent days and has advised customers on the best ways to mitigate it in their network. The HTTP/2 rapid reset vulnerability (CVE-2023-44487) leverages the characteristics of the HTTP/2 protocol. Unlike HTTP/1.1, ... Read More

The Role of AI in Modern Cybersecurity: Beyond the Buzz

| | Cyber Security, technology
In today’s world, and in particular, the cybersecurity landscape, the buzzword is undoubtedly “AI.” We’re constantly discussing it because of its incredible ability to think, create, and adapt in real-time. Artificial intelligence is going to be a key component of any modern security system as the volume and complexity of ... Read More

The Role of AI in Modern Cybersecurity: Beyond the Buzz

| | Cyber Security, technology
In today’s world, and in particular, the cybersecurity landscape, the buzzword is undoubtedly “AI.” We’re constantly discussing it because of its incredible ability to think, create, and adapt in real-time. Artificial intelligence is going to be a key component of any modern security system as the volume and complexity of ... Read More

Fighting Cybercrime One Packet at a Time: A10 Next-Gen WAF, Powered by Fastly

| | Cyber Security
In today’s digital landscape, layered defenses are crucial to protect against cyberattacks. Cybercriminals constantly evolve their tactics to exploit vulnerabilities in systems, which is why a layered defense strategy that provides comprehensive protection against a wide range of threats is essential. The end solution ultimately helps deliver better cloud economics ... Read More
Loading...