For over two decades, botnets have been at the heart of some of the most disruptive activity online - from large-scale DDoS campaigns to credential theft and malware distribution. While the end...
Blog
How to set a threshold for RTBH/BGP Blackhole: A practical guide to threshold-based DDoS defence
Threshold-based DDoS defence is one of the most effective ways to automate blackhole routing for high-volume attacks, without the need for constant manual oversight. In this post, weโll break down...
Path of Exile tightens DDoS protection following service disruptions
Grinding Gear Games (GGG), the developer of the action RPG Path of Exile, has implemented new security updates to strengthen its protection against Distributed DenialโofโService (DDoS) attacks. The...
A new variant of the Flodrix botnet has entered the sceneโฆ
A new variant of the Flodrix botnet has entered the scene, and itโs taking aim at poorly secured open-source tools with an unusual level of stealth and versatility. The newest Flodrix variant builds...
Book Review: DDoS โ Understanding Real-Life Attacks and Mitigation Strategies by Stefan Behte
Comprehensive resources on Distributed Denial of Service (DDoS) attacks are surprisingly hard to come byโespecially ones that are both technically accurate and grounded in real-world experience....
Internet Under Fire: Analysis of the record-breaking 7.3 Tbps DDoS attack
The Internet Just Survived the Largest DDoS Attack EverโHereโs What You Need to Know A new milestone in Distributed Denial of Service (DDoS) attacks has been reached: 7.3 terabits per second (Tbps)...
DDoS attacks are now targeting journalists, universities, NGOs. What has changed?
Historically, DDoS attacks focused on obvious targets: banks, telecoms, gaming platforms, and government services. But in 2025, the landscape has shifted. Todayโs DDoS campaigns are increasingly...
When is BGP blackholing a good choice for DDoS mitigation โ and when is it not?
BGP Blackholing, also known as RTBH (Remotely Triggered Black Hole), is a well-established technique in the DDoS mitigation playbook. Itโs fast, effective, and uses your upstream providersโ...
Anatomy of a Botnet
Botnets are behind some of the biggest online attacks weโve seen in recent years. They donโt usually rely on advanced hacking techniques or zero-day exploits. Instead, they quietly take over poorly...
Tier 1 transit and the DDoS comfort myths
If your organisation buys bandwidth from one of the big backbone carriers, you already sit behind formidable pipes and global scrubbing clouds. Sales decks often call this โbuilt-in DDoS...











