The Growing Threat of Application-Layer DDoS Attacks

| | Blog, DDoS attacks
In the cat-and-mouse game between DDoS hackers and defenders, it seems protection vendors have made great progress in the past year – particularly in the realm of application-layer attacks. Unsurprisingly, this forced ...
Amway Protects Website Performance & Saves Costs with DataDome

Amway Protects Website Performance & Saves Costs with DataDome

By blocking unwanted traffic in real time, the DataDome solution helps Feu Vert protect its data and reduce infrastructure costs ...
Softvoyage Automates Scraping Protection & Saves an Engineer-Day Per Week

Softvoyage Automates Scraping Protection & Saves an Engineer-Day Per Week

How DataDome helped Softvoyage secure its data, improve its website performance, and realize substantial time savings ...

Attackers Targeting Poorly Managed Linux SSH Servers

In recent times, Linux SSH servers have become a prime target for attackers aiming to compromise security and exploit vulnerabilities for malicious activities. This article delves into the growing concern surrounding poorly ...

Blender DDoS Attacks: Understanding the Threat Landscape

Cybersecurity challenges persist in the ever-evolving digital landscape, and DDoS (Distributed Denial of Service) attacks have been a significant threat. Recently, Blender, a renowned 3D design suite, fell victim to a series ...

Mirai Botnet Exploits Zero-Day Bugs For DDoS Attacks

InfectedSlurs, a Mirai botnet malware, has been exploiting two zero-day remote code execution (RCE) vulnerabilities. The malware targets routers and video recorders (NVR) devices, aiming to make them a part of its ...

Ddostf DDoS Botnet Malware Targets MySQL Servers

Beware of a new threat in the cyber realm: the ‘Ddostf’ malware botnet is on the prowl, specifically targeting MySQL servers. This malicious botnet enslaves MySQL servers for a sinister purpose – ...
DDoS Protection

DDoS Attack Mitigation Playbook for SOC and DevOps Teams

Facing DDoS threats? Arm your SOC & DevOps teams with effective mitigation strategies. Explore geo-fencing, IP blacklisting, and rate limiting in our playbook. The post DDoS Attack Mitigation Playbook for SOC and ...

OracleIV DDoS Botnet Alert: Secure Your Docker Engine APIs

Attention Docker users: a new threat known as OracleIV is on the rise, targeting publicly accessible Docker Engine API instances. Researchers from Cado have uncovered a campaign where attackers exploit misconfigurations to ...