Tag: DDoS

security transformation
The dawn of real-time defense: security transformation in the 2000s

The dawn of real-time defense: security transformation in the 2000s

As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...

/ November 14, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: HTTP/2 vulnerability

Cybersecurity Threat Advisory: HTTP/2 vulnerability

Amazon Web Services (AWS), Cloudflare, and Google announced measures to mitigate unprecedented distributed denial-of-service (DDoS) attacks that utilize an innovative HTTP/2 Rapid Reset technique. In this Cybersecurity Threat Advisory, learn the details of this threat, what the risks are, and...

/ October 19, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Significant increase of cyber incidents

Cybersecurity Threat Advisory: Significant increase of cyber incidents

This Cybersecurity Threat Advisory sheds light on the recent global events between Israel and Hamas that have caused a surge in cyber incidents from hacker activists, also known as “hacktivists”. These attacks have been experienced on both sides of the...

/ October 16, 2023
Tech Time Warp
Tech Time Warp: Why the Panix attack was a wake-up call

Tech Time Warp: Why the Panix attack was a wake-up call

In this week’s Tech Time Warp, we take a look at how a work emergency is never good news—and when notice of it comes late on a Friday afternoon, it’s even worse. Especially when the news is that your internet...

/ August 25, 2023
tech time warp
Tech Time Warp: How human error leads to July 1997 email outage

Tech Time Warp: How human error leads to July 1997 email outage

This week’s Tech Time Warp looks at how, in a world that’s so utterly reliant on the internet, service outages are hardly uncommon anymore, whether they’re the result of distributed denial of service (DDoS) attacks, like that which caused Microsoft...

/ July 21, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provide malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the...

/ May 11, 2022
DDoS “celebrates” 25th anniversary with a spike

DDoS “celebrates” 25th anniversary with a spike

The first documented widespread distributed denial-of-service (DDoS) attack occurred in 1996 when New York City-based internet provider, Panix, was attacked. The New York Times described it: Beginning Sept. 6 and continuing through at least last Tuesday, a hacker intent on shutting...

/ May 12, 2021
Seven key ways to defend a network from fatal DDoS attacks

Seven key ways to defend a network from fatal DDoS attacks

Distributed Denial of Service Attacks (DDoS) are much different than what they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, with the idea of overwhelming it...

/ November 3, 2020
When throttling is acceptable

When throttling is acceptable

I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...

/ September 2, 2019
Tech Time Warp: Code Red worm puts users on high alert

Tech Time Warp: Code Red worm puts users on high alert

Following a month of DDoS attacks and security bulletins, computer users were on high alert Aug. 1, 2001, as they waited to see whether the Code Red Worm would reappear to wreak more havoc.

/ August 3, 2018 / 2 Comments