DDoS Mitigation
Alert of Buffer Overflow Vulnerabilities in Multiple Ivanti Products (CVE-2025-0282)
Overview Recently, NSFOCUS detected that Ivanti issued a security announcement and fixed buffer overflow vulnerabilities (CVE-2025-0282) in several products of Ivanti. Due to the stack-based buffer overflow in Ivanti Connect Secure, Ivanti ...

The Importance Of Secure DNS In Enterprise Security Strategy
In today’s hyper-connected world, with the proliferation of applications and devices, has transformed the way we interact with the internet. From the rise in applications across cloud and containers, connected IoT devices ...

XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)
Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils (CVE-2024-3094), with a CVSS score of 10. Since the underlying layer of SSH relies ...

DDoS Traffic Analysis Techniques for SOC Teams
Equip your SOC team to analyze and counter application layer DDoS attacks for enhanced security. Explore key strategies for DDoS attack traffic analysis here. The post DDoS Traffic Analysis Techniques for SOC ...

4 Ways To Categorize Web DDoS Tsunami Attacks — Part 2
There is an array of dimensions that can be used to characterize botnets launching Web DDoS Tsunamis floods. The following are dimensions relevant primarily for attack detection and mitigation. Other dimensions (like ...

4 Ways To Categorize Web DDoS Tsunami Attacks — Part 1
It’s probably not news that the amount and frequency of cyber-attacks is rising precipitously. And one type of attack, the Web DDoS Tsunami, represents a notoriously large component of this growth. At ...

Top 15 DDoS Protection Best Practices
Irrespective of the business size or location, DDoS attack protection programs are mandatory today. Here are 15 best practices that will help you. The post Top 15 DDoS Protection Best Practices appeared ...
5 Things to Consider if You Need Ongoing DDoS Protection
Here are the first things that come to mind when many people think of a DDoS attack: Unsophisticated, the oldest trick in the book, not harmful, “I am not at risk”, and ...
How to Find Extra Cybersecurity Budget
Risk is up and budgets are down Organizational cybersecurity is a business issue, one could even say a finance issue, not just an IT issue. Gone are the days when cybersecurity was ...

DDoS Protection in the Age of 5G Networks, Edge Computing and Explosive Bandwidth Growth
Service providers need a DDoS security solution to support new infrastructure innovations while overcoming the explosive growth in DDoS attack intensity and sophistication of phantom flood attacks. The post DDoS Protection in ...