Major breakthrough from Operation PowerOFF In a sweeping international effort, law enforcement agencies from 15 countries have successfully dismantled 27 DDoS-for-hire services, commonly referred to a…
Several Danish municipalities recently fell victim to Distributed Denial of Service (DDoS) attacks, disrupting the websites of cities including Vejle, Albertslund, Dragør, Esbjerg, Frederiksberg, and…
Introduction to BGP Blackhole and automating it for DDoS defense In this article, we will discuss how the routing infrastructure, more specifically the BGP routing technique called “blackholing”, …
How have Network Layer DDoS attacks developed over the last decade? Despite being one of the oldest types of cyberattacks, Distributed Denial of Service attacks still remain the most common cyber thre…
The Korean National Police Agency has arrested the CEO and five employees of a South Korean company for a peculiar cybercrime. The company has been manufacturing and exporting a large number of satell…
The Matrix Botnet, a threat actor linked to a widespread DDoS campaign has been uncovered by security researchers. The botnet is exploiting vulnerabilities and misconfigurations in Internet of Things …
On Sunday November 10th, a DDoS attack caused widespread disruption to credit card readers across Israel, affecting several payment systems in supermarkets and gas stations. The incident, which lasted…
In recent weeks, South Korea has found itself at the center of a series of distributed denial-of-service (DDoS) attacks, coinciding with heightened geopolitical tensions. The South Korean President’…
Last week several UK councils experienced outages on their websites, with some even knocked offline or rendered inaccessible to users, due to a series of DDoS attacks. The cyber onslaught targeted var…
German police have announced the disruption of a DDoS-for-hire platform dstat[.]cc. The platform has been playing a significant role in facilitating distributed denial-of-service (DDoS) attacks, and t…
How compromised CUPS servers can be a DDoS threat? A newly discovered vulnerability (CVE-2024-47850) in the Common Unix Printing System (CUPS) can be exploited to stage DDoS attacks. Starting an attac…
One of the biggest benefits of cloud infrastructure is its (theoretically) infinite scalability. Cloud applications can scale automatically to cope with increased demand, dynamically allocating additi…
An old IT proverb states, ‘If ain’t broke, don’t fix it’; if a system continues to deliver the results you want, there is no need to replace it. But at a time when cybersecurity threats evolve…
The UK’s National Crime Agency has identified two key cyberthreats to business – ransomware and DDoS attacks. But how do we find ourselves in this situation? And what can be done to better protect…
Distributed Denial of Service attacks (DDoS) remain one of the most significant cybersecurity threats posed to businesses today. This is particularly true as DDoS attacks are now typically accompanied…
It may be tempting to think of DDoS detection and mitigation as being an enterprise-only requirement. But as 40% of all cybersecurity events are now caused by distributed denial of service attacks, al…
Effective network security can be reduced to two goals; keeping unauthorised users out and keeping sensitive data in. But as IT systems continue to evolve, particularly in the era of the cloud, the st…
Distributed denial of service attacks (DDoS) are a significant risk to businesses of any size. One study found that recovering from a DDoS attack costs between $120,000 and $2m (£93,000 – £1.5…
Carpet bombing DDoS attacks are an increasingly common form of cybercrime because they are harder to detect and block than a traditional targeted attack. However, FastNetMon provides powerful configur…
The increased severity and sophistication of DDoS attacks means that network security administrators need a collection of tools to mitigate risk. One effective option to reduce malicious traffic is th…
First used in 2016, the Mirai botnet is old news. Built by two university students, the IoT-powered botnet was initially used to extort money from games server hosts. A few months later Mirai wa…
Application Layer DDoS attacks are an extremely popular, and effective, technique used by cybercriminals to disrupt web-based services. There are several variations of application layer attacks, so mi…
Denial of service attacks all have one goal in common – to use network traffic to overload a target system causing it to fail or become unresponsive. For the criminals behind these attacks, there is…
FastNetMon Stories: Here from real users of the FastNetMon solution MKE Solutions, a leading telecommunications consultancy, turned to FastNetMon to address their critical problem of enduring 35 daily…
A recent survey found 81% of IT leaders believe network visibility is essential for strong network security and response. The survey, conducted by Forrester on behalf of Infoblox, reached 423 IT leade…
Recently, we wrote about how network visibility can help organisations detect cyber threats, illuminate network blind spots, optimise network performance, and more. Today, we’re taking a step back a…
Network security is a critical function for any business today—and it started with network traffic visibility. To protect against increasingly sophisticated cyberattacks, organisations must be able …
Network observability is the first step in preventing any network-based cyberattack. Without the ability to observe the entire network, there is simply no way to detect and prevent malicious activity,…
It’s 2023. A new year. But before we start talking about the latest DDoS trends, news, and mitigation advice, it’s worth looking back over the events of the year past. In this article, we’ll loo…
Anti-DDoS systems have become a crucial part of any cybersecurity strategy. According to the 2022 Data Breach Investigations Report, DDoS attacks account for 40% of all security incidents. Attacks are…
For an ISP, DDoS attacks can be hugely damaging. A large volumetric attack can disrupt customer-facing services, harming an ISP’s business model, damaging the customer experience, and potentially co…
Over the last decade, DDoS has become one of the most common forms of cyberattack. And that’s hardly surprising. From a bad actor’s perspective, DDoS attacks are fast, easy, low-cost… and potent…
Internet-connected devices, services, and applications are now abundant in every industry. Even traditional industries are going through rapid digital transformation programs, using technology to crea…