• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

application layer attacks

DDoS Protection Service: Nexusguard

April 2, 2018 By TheNewsTeam

Nexusguard is seen as one of the top DDoS protection services for small and medium-sized organizations, which in addition to mitigating attacks will also optimize your online content through its role as a CDN and its global presence. Its service … [Read more...] about DDoS Protection Service: Nexusguard

On-Premises DDoS Protection: Is it still necessary?

April 2, 2018 By TheNewsTeam

Despite the huge growth in cloud-based DDoS protection and a perception that on-premises protection is out-of-date and old school, many security researchers believe that on-premises protection against DDoS is still the most effective kind of … [Read more...] about On-Premises DDoS Protection: Is it still necessary?

Key Takeaways on DDoS from Akamai’s Q4 2017 Report

March 1, 2018 By TheNewsTeam

Akamai’s latest security report, focused on Q4 2017, noted that DDoS attacks went up by 14% year-on-year. Application-layer attacks rose by 115% quarter by quarter, however, they still comprised under 1% of all DDoS attacks. Year-on-year, there was … [Read more...] about Key Takeaways on DDoS from Akamai’s Q4 2017 Report

Is Layer 7 DoS Protection Necessary?

February 22, 2018 By TheNewsTeam

An increasing number of DDoS attacks are aimed directly at Layer 7 (applications). They tend to be disguised to look like real traffic. Layer 7 is often targeted after attacks at the Layer 3 and Layer 4 level have failed. The ability to mitigate a … [Read more...] about Is Layer 7 DoS Protection Necessary?

What is an HTTP Flood?

December 23, 2017 By TheNewsTeam

In a HTTP Flood, attackers send vast numbers of legitimate HTTP requests to a server. The request can either be “GET” or “POST”. The goal of this kind of DDoS attack is to force the server to allocate so many of its resources to serving the attack … [Read more...] about What is an HTTP Flood?

DDoS Attack Types

December 14, 2017 By TheNewsTeam

A DDoS attack is always launched from multiple compromised devices, often distributed in different locations, known as a botnet, usually controlled remotely by a single threat actor. It is different from a denial-of-service (DoS) attack because it … [Read more...] about DDoS Attack Types

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.