Preparation for ADS Diversion

Preparation for ADS Diversion

| | ads, DDoS attack, knowledge base
This article summarizes the preparation configuration of ADS diversion. The specific configuration details may vary depending on the information of the ADS on the client side, router information, and ADS version. The ...
Preliminary Troubleshooting for Cloud Authentication Failure in ADS, NTA and ADSM

Preliminary Troubleshooting for Cloud Authentication Failure in ADS, NTA and ADSM

| | ads, ADSM, DDoS attack, knowledge base, NTA
If the virtual product uses cloud authentication, it needs to communicate with the cloud authentication center periodically every day to complete the authentication and ensure availability. You can confirm the authorization mode ...
Troubleshooting for NTA and ADS Automatic Diversion

Troubleshooting for NTA and ADS Automatic Diversion

| | ads, DDoS attack, knowledge base, NTA
When NTA detects abnormal traffic, it can notify ADS to divert the traffic. ADS sends route diversion notifications to the router, redirecting the traffic to ADS for cleaning. Based on this scenario, ...
HTTP/2 Protection in ADS R90F03

HTTP/2 Protection in ADS R90F03

| | ads
Function Description For HTTPS application layer protection, ADS establishes a TLS connection with a client in replace of the server, and then authenticates the client through the application-layer protocol HTTP. If the ...
Automated and Manual Backup Procedures for ADS, ADSM and NTA

Automated and Manual Backup Procedures for ADS, ADSM and NTA

| | ads, ADSM, DDoS attack, NTA
Configuration backup is important in many scenarios: Next, we will provide a step-by-step guide on performing configuration backup individually for ADS, ADSM, and NTA. ADS ADS supports one-click export of the current ...
Introduction to ADS’s HTTP Keyword Checking Policy

Introduction to ADS’s HTTP Keyword Checking Policy

| | ads, DDoS attack
HTTP Keyword Checking is a process by which ADS controls HTTP traffic through the ADS device. In addition, ADS takes a specific action (Accept, Drop, Disconnect, Add to blacklist, Add to whitelist, ...
Blacklist Function Optimization on ADS R90F03

Blacklist Function Optimization on ADS R90F03

| | ads, Anti-DDoS
ADS R90F03 refactors the blacklist function. You can configure group-specific blacklist rules, and blacklists of different groups take effect independently. Besides, you can use a global blacklist to make related rules and ...
Florida Water Supply Hack, Android App Hijack, US Capitol Riot Smartphone Tracking

Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking

In episode 160: An attacker tried to poison a Florida city’s water supply, a popular Android app was hacked to display malicious ads, and how smartphone location data was used to track ...
Aggressive Adware Promised Free Stuff to Android Users Just to Stay Installed

Aggressive Adware Promised Free Stuff to Android Users Just to Stay Installed

Aggressive adware apps invade tens of thousands of devices Operators designed the apps to run unhindered in the background Google removed all of the fake apps from the Play Store Security researchers ...
eGobbler infects more than 1 billion ads in worldwide campaign

eGobbler infects more than 1 billion ads in worldwide campaign

The eGobbler malvertising threat actor has made a return, this time exploiting a WebKit vulnerability used primarily by iPhone’s Safari browser. Security researchers from Confiant estimate up to 1.16 billion impressions have ...