Tag: DDoS
The dawn of real-time defense: security transformation in the 2000s
As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...
Cybersecurity Threat Advisory: HTTP/2 vulnerability
Amazon Web Services (AWS), Cloudflare, and Google announced measures to mitigate unprecedented distributed denial-of-service (DDoS) attacks that utilize an innovative HTTP/2 Rapid Reset technique. In this Cybersecurity Threat Advisory, learn the details of this threat, what the risks are, and...
Cybersecurity Threat Advisory: Significant increase of cyber incidents
This Cybersecurity Threat Advisory sheds light on the recent global events between Israel and Hamas that have caused a surge in cyber incidents from hacker activists, also known as “hacktivists”. These attacks have been experienced on both sides of the...
Tech Time Warp: Why the Panix attack was a wake-up call
In this week’s Tech Time Warp, we take a look at how a work emergency is never good news—and when notice of it comes late on a Friday afternoon, it’s even worse. Especially when the news is that your internet...
Tech Time Warp: How human error leads to July 1997 email outage
This week’s Tech Time Warp looks at how, in a world that’s so utterly reliant on the internet, service outages are hardly uncommon anymore, whether they’re the result of distributed denial of service (DDoS) attacks, like that which caused Microsoft...
Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks
F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provide malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the...
DDoS “celebrates” 25th anniversary with a spike
The first documented widespread distributed denial-of-service (DDoS) attack occurred in 1996 when New York City-based internet provider, Panix, was attacked. The New York Times described it: Beginning Sept. 6 and continuing through at least last Tuesday, a hacker intent on shutting...
Seven key ways to defend a network from fatal DDoS attacks
Distributed Denial of Service Attacks (DDoS) are much different than what they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, with the idea of overwhelming it...
When throttling is acceptable
I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...
Tech Time Warp: Code Red worm puts users on high alert
Following a month of DDoS attacks and security bulletins, computer users were on high alert Aug. 1, 2001, as they waited to see whether the Code Red Worm would reappear to wreak more havoc.