• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

What is Remotely-Triggered Black Hole (RTBH) Routing?

March 31, 2018 By TheNewsTeam

Remotely-Triggered Black Hole (RTBH) routing is a kind of application of BGP as a security tool within a service provider network. RTBH is frequently deployed in the mitigation of DDoS attacks, particularly when incoming traffic needs to be blocked … [Read more...] about What is Remotely-Triggered Black Hole (RTBH) Routing?

Cloud Protection: DNS Redirect vs. BGP Redirect

March 31, 2018 By TheNewsTeam

During a DDoS attack, the re-direction of traffic in the cloud comes in two varieties: DNS redirect (for application layer protection) and BGP redirect (for network/transport layer protection). Redirecting Traffic via DNS Domain Name Servers (DNS) … [Read more...] about Cloud Protection: DNS Redirect vs. BGP Redirect

What are the Disadvantages to Cloud-based DDoS Scrubbing?

March 31, 2018 By TheNewsTeam

While there are many advantages to cloud-based DDoS scrubbing, which filters malicious traffic from legitimate, there are several disadvantages as well. These include: - Scrubbing centers are only able to monitor inbound traffic - As outbound … [Read more...] about What are the Disadvantages to Cloud-based DDoS Scrubbing?

What is Cloud-based DDoS Scrubbing?

March 31, 2018 By TheNewsTeam

Cloud-based scrubbing employs separate DDoS traffic-cleaning engines to ‘scrub’ clean traffic, filtering bad from good. It is essentially used as an additional layer of protection during a DDoS attack rather than a primary mitigation … [Read more...] about What is Cloud-based DDoS Scrubbing?

What is Permanent Denial of Service (PDoS)?

March 31, 2018 By TheNewsTeam

A Permanent Denial of Service attack, or a PDoS attack, is denial-of-service via the intentional sabotage of hardware. Phlashing is one such method of PDoS. An attacker bricks a device or destroys firmware by uploading a corrupted BIOS to a device, … [Read more...] about What is Permanent Denial of Service (PDoS)?

Big Data Analysis and DDoS

March 23, 2018 By TheNewsTeam

Big data aims to offer an answer to the outdated nature of detection appliances by offering the ability to baseline based on network-wide data, which increases accuracy of detection. A machine learning approach allows for greater granularity of … [Read more...] about Big Data Analysis and DDoS

Traditional DDoS Mitigation Architecture

March 23, 2018 By TheNewsTeam

There are many types of DDoS protection. The essential traditional architecture for DDoS defense works as follows. Flow data, complementary BGP and SNMP data, all based on incoming traffic flow are sent to a detection appliance inside the network … [Read more...] about Traditional DDoS Mitigation Architecture

DDoS Protection Service: Google’s Cloud Armor

March 23, 2018 By TheNewsTeam

Google launched its own DDoS protection service this week called Cloud Armor. In a blog post, Google Cloud Platform (GCP) rolled it out with several other new services, designed to boost security. These include a dashboard covering various GCP … [Read more...] about DDoS Protection Service: Google’s Cloud Armor

DDoS Protection Service: Neustar

March 21, 2018 By TheNewsTeam

Neustar provides information services and analytics to marketers and other industries drawing on big-data analysis. As part of their portfolio of solutions, Neustar also offers DDoS protection. The company’s SiteProtect NG offers a massive 10TBP of … [Read more...] about DDoS Protection Service: Neustar

DDoS Protection Service: Verisign

March 21, 2018 By TheNewsTeam

Verisign provides Internet infrastructure services and was founded in 1995. Its initial focus was on domain names and operating two of the Internet’s thirteen root nameservers; however, it also offers in-depth cyber security services. This includes … [Read more...] about DDoS Protection Service: Verisign

DDoS Protection Service: Kentik

March 21, 2018 By TheNewsTeam

Kentik offers its DDoS protection in the context of being primarily focused on big data traffic intelligence. The San Francisco-headquartered company formerly known as CloudHelix provides network visibility and performance solutions. Its main … [Read more...] about DDoS Protection Service: Kentik

What is the GDI Foundation?

March 18, 2018 By TheNewsTeam

The GDI Foundation is a nonprofit whose mission is “to defend the free & open Internet by trying to make it safer. We address security issues via Responsible Disclosure”. They are headquartered in The Hague in The Netherlands and was founded by … [Read more...] about What is the GDI Foundation?

Code for MemCached DDoS Attacks Made Public

March 18, 2018 By TheNewsTeam

The tools for launching the record-setting MemCached DDoS attacks of early March were made public shortly afterwards. Proof-of-concept code named “MemCached-DDoS-Exploit” was posted on GitHub, listed as a “DDoS attack tool for sending forged UDP … [Read more...] about Code for MemCached DDoS Attacks Made Public

Hackable IoT Cameras: DDoS Attacks are Just the Tip of the Iceberg

March 18, 2018 By TheNewsTeam

Hacking a CCTV camera is worryingly easy. Many such devices have poor security practices with default passwords and remote access enabled from installation. The bandwidth of vulnerable IP cameras can easily be put into service as part of a botnet … [Read more...] about Hackable IoT Cameras: DDoS Attacks are Just the Tip of the Iceberg

IP Cameras and the Four Botnets that Target Them

March 18, 2018 By TheNewsTeam

IP cameras are a common target for botnets. There is significant competition between different malware families. Each has its own unique set of features, but all aim to build defenses to block other malware from taking over their turf. Each piece of … [Read more...] about IP Cameras and the Four Botnets that Target Them

« Previous Page
Next Page »

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.