The Modern Era: from modular loaders to multi-vector flood engines As defenders have become more aware of the classic tactics used by earlier botnets like BASHLITE, Mirai, and GameOver Zeus, ...
FastNetMon was recently featured in an interview with Website Planet, an expert blog focused on hosting, infrastructure, and web technologies. In the conversation, our Founder Pavel Odintsov shares insights into ...
Juniper Networks has disclosed a new vulnerability (CVE-2025-52953) affecting Junos OS and Junos OS Evolved, which allows an unauthenticated adjacent attacker to send a valid BGP UPDATE packet that resets ...
Distributed Denial of Service (DDoS) attacks at layers 3 and 4 are blunt, fast, and disruptive. If you’re running networks at any scale, chances are you’ve already seen your fair ...
In a continuing wave of new malware activity, researchers have uncovered a botnet dubbed RondoDox, which is actively exploiting known vulnerabilities in TBK digital video recorders (DVRs) and Four-Faith routers ...
A newly discovered botnet family dubbed Hpingbot is gaining attention in the cybersecurity community for its novel approach to malware delivery and DDoS execution. Detected by NSFOCUS’s Fuying Lab in ...
For over two decades, botnets have been at the heart of some of the most disruptive activity online – from large-scale DDoS campaigns to credential theft and malware distribution. While ...
Threshold-based DDoS defence is one of the most effective ways to automate blackhole routing for high-volume attacks, without the need for constant manual oversight. In this post, we’ll break down ...
FastNetMon Interviewed by Safety Detectives: Rethinking DDoS Protection for a Faster, Safer Internet
FastNetMon was recently featured in an interview with Safety Detectives, a cybersecurity blog. The conversation covers the rising threat of Distributed Denial of Service (DDoS) attacks and how FastNetMon is ...
Grinding Gear Games (GGG), the developer of the action RPG Path of Exile, has implemented new security updates to strengthen its protection against Distributed Denial‑of‑Service (DDoS) attacks. The changes follow ...