DDoS attack
Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service
Hungarian financial institutions and telecoms infrastructure suffered a cyber attack on Thursday, last week. According to Magyar Telekom, the attackContinue reading The post Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service ...
Are Businesses Unprepared to Fight Bot Attacks?
Businesses know bots present a big threat to their security and sensitive data. But they’re not doing nearly enough to mitigate the problem, according to new research from Netacea, which looked at ...
Akamai Discloses Details of Massive DDoS Attack
Akamai this week revealed it mitigated a massive 1.44 terabits-per-second (TBPS) distributed denial of service (DDoS) attack that for nearly two hours reached levels of 385 million packets per second (MPPS). Roger ...
How to Protect Your VPN: Lessons From a DDoS Attack Test
In the wake of the COVID-19 pandemic, many IT organizations find themselves scrambling to meet the sudden spike in VPN traffic. The post How to Protect Your VPN: Lessons From a DDoS ...
Mitigate then Investigate: Watch a Live DDoS Attack
Recently Andy Shoemaker, founder of NimbusDDOS, and our own David Elmaleh shared their knowledge about DDoS attacks and what it means to have industry-best protection capabilities including fast time to mitigation. They ...
Understanding DDoS attacks: a guide for WordPress administrators
A Distributed Denial of Service (DDoS) is a type of Denial of Service (DoS) attack in which the attack comes from multiple hosts as opposed to one, making them very difficult to ...
5 Steps to Prepare for a DDoS Attack
It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack. The reasons for DDoS attacks can vary from cyber crime to hacktivism to simple ...
Gamers Beware: Cyber Criminals Are Coming For You
It’s been 17 years since Xbox Live was first released. While it was not the first online gaming network, it did become a cornerstone of things to come. Fast forward almost two ...
Behind the Disguise of Trojans
A Trojan horse is a malicious computer program masquerading as a useful or otherwise non-malicious, legitimate piece of software. Generally spread via social engineering and web attacks, Trojan horses often install a ...
Enabling Faster DDoS Mitigation for Cloud Assets
The cloud journey was considered a visionary approach less than a decade ago. Today, more than half of organizations rely on a cloud provider, and are planning to expand their portfolios across ...

