• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Prolexic

What are SSL-based DDoS Attacks and How to Mitigate Them

April 20, 2018 By TheNewsTeam

SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them

DDoS Protection Service: Akamai

March 10, 2018 By TheNewsTeam

Akamai is one of the world’s largest DDoS protection service providers. It offers two kinds of service that use different protection measures: Prolexic and Kona Site Defender. Prolexic is grounded in border gateway protocol (BGP) that routes … [Read more...] about DDoS Protection Service: Akamai

Massive Memcached DDoS Attacks Mark Largest Ever

March 10, 2018 By TheNewsTeam

Last week, code repository GitHub experienced the most powerful DDoS attack recorded to date at 1.35 Tbps. No botnet was required, and it used an increasingly popular DDoS method. GitHub’s site was only down for 10 minutes as it automatically … [Read more...] about Massive Memcached DDoS Attacks Mark Largest Ever

Why Do People Perform DDoS Attacks?

December 8, 2017 By TheNewsTeam

Last September, independent journalist Brian Krebs found himself the victim of a record-breaking digital attack when a huge amount of junk traffic (between 600-700Gbps) took his website, KrebsonSecurity.com offline. Ironically, Krebs is a digital … [Read more...] about Why Do People Perform DDoS Attacks?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.