• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

DDoS Landscape

The Last Decade in DDoS

February 17, 2018 By TheNewsTeam

DDoS attacks have seen a huge explosion in size and scale over the last decade. The last three years alone have seen the largest DDoS attack in history milestone be repeatedly knocked down. One of the most interesting of these in terms of politics … [Read more...] about The Last Decade in DDoS

Accidental DDoS

February 17, 2018 By TheNewsTeam

Kaspersky Labs just published a report on DDoS attacks in Q4 2017 and found that a surprising number of DDoS attacks are not motivated by financial gain or to profit on the huge spike in Bitcoin, but are in fact the accidental outcome of botnet side … [Read more...] about Accidental DDoS

What is The Digital Attack Map?

February 9, 2018 By TheNewsTeam

The Digital Attack Map is a free online resource, which allows you to observe in real time the top DDoS attacks worldwide on a daily basis. Data shown represents only the top 1% of reported attacks around the world. The map allows you to search … [Read more...] about What is The Digital Attack Map?

DDoS Attacks in Cloud Computing

January 25, 2018 By TheNewsTeam

Cloud computing allows on-demand access to a shared pool of resources, including networks, servers, storage and services. DoS and DDoS attacks are serious threats to the availability of services offered on the cloud because of the various new … [Read more...] about DDoS Attacks in Cloud Computing

Shopper Holiday DDoS Attacks

January 18, 2018 By TheNewsTeam

Shopper holiday DDoS attacks are nothing new. Back in 2009, a DDoS attack on a major DNS provider took some of the web’s biggest online stores offline. The websites for Amazon and Wal-Mart were both taken down for an hour at the peak of the … [Read more...] about Shopper Holiday DDoS Attacks

Gamer Holiday DDoS Attacks

January 18, 2018 By TheNewsTeam

Gamer holiday DDoS attacks are not a new phenomenon. The end of year holiday period has become a time for increased DDoS attacks, particularly those targeted at gamers. The holidays usually see growth spurts in the number of gamers online, keen to … [Read more...] about Gamer Holiday DDoS Attacks

What is Second-Hand DDoS?

January 18, 2018 By TheNewsTeam

As enterprises increasingly depend on hosted infrastructure and services, they are placing themselves at greater risk of second-hand DDoS attacks. The size and scale of hosting or datacentre operator network infrastructures and their huge customer … [Read more...] about What is Second-Hand DDoS?

Ransom Denial of Service (RDoS) Attacks Making a Comeback

January 13, 2018 By TheNewsTeam

As Corero Network Security noted in its most recent report focused on Q2 and Q3 of 2017, ransom denial of service (RDoS) attacks made a significant comeback last year. RDoS attacks enable cybercriminals to extort money from their targets. The … [Read more...] about Ransom Denial of Service (RDoS) Attacks Making a Comeback

2017 Trends in DDoS, According to Corero

January 13, 2018 By TheNewsTeam

Cybersecurity firm Corero Network Security issued a year-end report, focused on Q2 and Q3 2017, showing that DDoS attacks had doubled over the six month period. Its researchers largely attributed this rapid growth to unsecured Internet of Things … [Read more...] about 2017 Trends in DDoS, According to Corero

The Evolving DDoS Landscape, According to Fastly

January 13, 2018 By TheNewsTeam

Fastly recently published its end-of-year post looking at the evolving DDoS landscape.   Fastly has scaled rapidly since its founding in 2011 as a CDN into an edge cloud platform serving more than 10% of all Internet requests worldwide, putting it … [Read more...] about The Evolving DDoS Landscape, According to Fastly

« Previous Page

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.