by FastNetMon | Jul 14, 2025 | Blog
Juniper Networks has disclosed a new vulnerability (CVE-2025-52953) affecting Junos OS and Junos OS Evolved, which allows an unauthenticated adjacent attacker to send a valid BGP UPDATE packet that resets live BGP sessions, leading to a sustained denial of service...
by FastNetMon | Jul 8, 2025 | Blog
Distributed Denial of Service (DDoS) attacks at layers 3 and 4 are blunt, fast, and disruptive. If you’re running networks at any scale, chances are you’ve already seen your fair share of UDP floods, TCP SYN storms, and other packet-level abuse. Detection is step one....
by FastNetMon | Jul 8, 2025 | Blog
In a continuing wave of new malware activity, researchers have uncovered a botnet dubbed RondoDox, which is actively exploiting known vulnerabilities in TBK digital video recorders (DVRs) and Four-Faith routers to take over Linux-based devices. These devices—often...
by FastNetMon | Jul 7, 2025 | Blog
A newly discovered botnet family dubbed Hpingbot is gaining attention in the cybersecurity community for its novel approach to malware delivery and DDoS execution. Detected by NSFOCUS’s Fuying Lab in June 2025, Hpingbot is a cross-platform Go-based botnet actively...
by FastNetMon | Jul 3, 2025 | Blog
For over two decades, botnets have been at the heart of some of the most disruptive activity online – from large-scale DDoS campaigns to credential theft and malware distribution. While the end goals haven’t changed much, the technical machinery behind them has...
by FastNetMon | Jul 2, 2025 | Blog
Threshold-based DDoS defence is one of the most effective ways to automate blackhole routing for high-volume attacks, without the need for constant manual oversight. In this post, we’ll break down how threshold-based mitigation works, how to configure it in...