• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Amplification Attacks

Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks

March 10, 2018 By TheNewsTeam

Researchers at DDoS protection firm Corero Network Security have released a post stating that the memcached amplification attacks that hit GitHub and other networks over the last week with the largest ever DDoS attacks can be disarmed with a … [Read more...] about Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks

What is Memcached DDoS?

March 10, 2018 By TheNewsTeam

Memcached is a tool used to cache data and lessen strain on large data stores, such as disk or databases. The memcached protocol involves the server being queried for information about key value stories. It was built to be used on systems that are … [Read more...] about What is Memcached DDoS?

Massive Memcached DDoS Attacks Mark Largest Ever

March 10, 2018 By TheNewsTeam

Last week, code repository GitHub experienced the most powerful DDoS attack recorded to date at 1.35 Tbps. No botnet was required, and it used an increasingly popular DDoS method. GitHub’s site was only down for 10 minutes as it automatically … [Read more...] about Massive Memcached DDoS Attacks Mark Largest Ever

What is a NTP Amplification Attack?

December 28, 2017 By TheNewsTeam

An NTP amplification attack is one in which the perpetrator seeks to overwhelm a targeted server and its surrounding infrastructure with UDP traffic by exploiting publicly accessible Network Time Protocol (NTP) servers. This type of DDoS attack is … [Read more...] about What is a NTP Amplification Attack?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.