Amplification attack vectors are some of the most commonly used tools in the DDoS attacker’s arsenal. In the last quarter of 2017, we saw NTP amplification employed in roughly 33 percent of all DDoS assaults
A focus on innovation and creativity is ever-present in our work. One of the more prominent examples of that is our annual hackathon, which give us a chance to fuel up on pizza and flex
We recently saw a new DDoS amplification attack vector via memcached servers that started on February 21 and culminated in two massive DDoS amplification attacks on February 28. Both attacks were mitigated successfully. Here's how
How do credential stuffing attacks work? Read more on what the research team did to detect and mitigate credential stuffing attacks on Incapsula customers.
Online excitement is at an all-time high, as the December release of Star Wars: The Last Jedi, the latest installment in the Star Wars saga, draws closer. With the internet abuzz about recent trailers, looming
Email spam is a bane of our online existence. It serves as a distribution mechanism for false information, infectious malware, phishing messages and everything in between. Among spam campaigns, the “Canadian pharmacy” scam is one
As the end of the year approaches, it’s natural to contemplate the future and look for signs of things to come. Sometimes, however, you don’t have to search too hard. Sometimes, these “signs” hit you
It’s been over two months since Mirai source code was leaked on the HackForum, placing it into the hands of botnet herders around the world. What followed was a stream of reports about high-profile Mirai-powered
DDoS attacks are familiar territory for our team, but they can be frustratingly abstract for many network ops teams. In fact, it’s often difficult to recognize an attack when it’s in progress. And furthermore, few
Our Most Read Posts
Sorry. No data so far.