On 21 March 2025, we had the pleasure of attending CLNOG 2025, held in Santiago, Chile. This event brought together network operators and industry experts from across the region, highlighting ...
Threshold-based DDoS defence is one of the most effective ways to automate blackhole routing for high-volume attacks, without the need for constant manual oversight. In this post, we’ll break down ...
FastNetMon Interviewed by Safety Detectives: Rethinking DDoS Protection for a Faster, Safer Internet
FastNetMon was recently featured in an interview with Safety Detectives, a cybersecurity blog. The conversation covers the rising threat of Distributed Denial of Service (DDoS) attacks and how FastNetMon is ...
Grinding Gear Games (GGG), the developer of the action RPG Path of Exile, has implemented new security updates to strengthen its protection against Distributed Denial‑of‑Service (DDoS) attacks. The changes follow ...
A new variant of the Flodrix botnet has entered the scene, and it’s taking aim at poorly secured open-source tools with an unusual level of stealth and versatility. The newest ...
Greetings from FastNetMon, your fast and reliable DDoS detection solution provider. Here’s your monthly dosis of hottest industry events, network security threats, and useful product updates we think you should ...
Comprehensive resources on Distributed Denial of Service (DDoS) attacks are surprisingly hard to come by—especially ones that are both technically accurate and grounded in real-world experience. That’s why Stefan Behte’s ...
The Internet Just Survived the Largest DDoS Attack Ever—Here’s What You Need to Know A new milestone in Distributed Denial of Service (DDoS) attacks has been reached: 7.3 terabits per ...
Historically, DDoS attacks focused on obvious targets: banks, telecoms, gaming platforms, and government services. But in 2025, the landscape has shifted. Today’s DDoS campaigns are increasingly aimed at organisations that ...
BGP Blackholing, also known as RTBH (Remotely Triggered Black Hole), is a well-established technique in the DDoS mitigation playbook. It’s fast, effective, and uses your upstream providers’ infrastructure to stop ...
Botnets are behind some of the biggest online attacks we’ve seen in recent years. They don’t usually rely on advanced hacking techniques or zero-day exploits. Instead, they quietly take over ...