• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

multi-vector attacks

Nexusguard DDoS Threat Report for Q4-2017

April 5, 2018 By TheNewsTeam

Nexusguard, a specialist in DDoS attack mitigation, produces a security threat report on a quarterly basis, based on the real-time data it collects year-round on threats facing businesses and service-provider networks around the globe. Nexusguard … [Read more...] about Nexusguard DDoS Threat Report for Q4-2017

Multi-Vector DDoS Attacks are on the Rise

April 5, 2018 By TheNewsTeam

Multi-vector DDoS attacks are when an attacker quickly shifts from launching one kind of DDoS attack to another to another. Chaining together different forms of DDoS attack has become a popular mode of attack since late 2015, and shows no sign of … [Read more...] about Multi-Vector DDoS Attacks are on the Rise

Arbor Networks 13th Security Report: Key Findings

April 2, 2018 By TheNewsTeam

In October 2017, NETSCOUT Arbor collected data from 390 individuals within the operational security community to compile the company’s 13th annual Worldwide Infrastructure Security Report (WISR). 128 freeform and multiple choice questions were asked … [Read more...] about Arbor Networks 13th Security Report: Key Findings

What is Cloud-based DDoS Scrubbing?

March 31, 2018 By TheNewsTeam

Cloud-based scrubbing employs separate DDoS traffic-cleaning engines to ‘scrub’ clean traffic, filtering bad from good. It is essentially used as an additional layer of protection during a DDoS attack rather than a primary mitigation … [Read more...] about What is Cloud-based DDoS Scrubbing?

2017 Trends in DDoS, According to Corero

January 13, 2018 By TheNewsTeam

Cybersecurity firm Corero Network Security issued a year-end report, focused on Q2 and Q3 2017, showing that DDoS attacks had doubled over the six month period. Its researchers largely attributed this rapid growth to unsecured Internet of Things … [Read more...] about 2017 Trends in DDoS, According to Corero

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.