DDoS attack
Six Algorithms for Defending Against the Novel “HTTP/2 Rapid Reset” DDoS Attack
A recently discovered HTTP/2 protocol-based Distributed-Denial-of-Service (DDoS) vulnerability has been identified by multiple cloud service providers. This vulnerability enables attackers to achieve an unprecedented record of 398 million requests per second. This ...
DDoS Attacks Leveraged by Attackers in Israel Conflict
Over the last few years, we’ve observed Distributed Denial of Service (DDoS) attacks used in many conflicts. In the Russia-Ukraine war, DDoS was used both by government cyber agencies and individual hacktivist ...
Cloudflare, Google, AWS Battle Record-Setting ‘Rapid Reset’ DDoS Attacks
Cloud giants Amazon Web Services, Google, and Cloudflare are warning about a novel zero-day vulnerability in the HTTP/2 protocol that allows threat groups to launch massive distributed denial-of-service (DDoS) attacks that dwarf ...
A Growing Cyberwar in the Widening Israeli-Hamas Conflict
The unprecedented assault by Hamas on Israel over the weekend brought with it cyberattacks by a number of known threat groups, echoing what was seen in the runup and aftermath of Russia’s ...
Automated and Manual Backup Procedures for ADS, ADSM and NTA
Configuration backup is important in many scenarios: Next, we will provide a step-by-step guide on performing configuration backup individually for ADS, ADSM, and NTA. ADS ADS supports one-click export of the current ...
Mirai Botnet’s New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught
I. Abstract In September 2023, NSFOCUS global threat hunting system monitored several new botnet variant families developed based on Mirai, among which hailBot, kiraiBot and catDDoS are the most active, are accelerating ...
Feature Adaptations on Slave ADSM in a High Availability Environment
Sometimes, to ensure continuous business operations in the event of equipment failure, it is a common practice to configure High Availability (HA) using two ADSM devices. You can configure High Availability (HA) ...
Fundamentals of Origin Server Protection
Protecting your origin servers is non-negotiable. Uncover the reasons behind it and learn six practical strategies for enhancing your origin protection. The post Fundamentals of Origin Server Protection appeared first on Indusface ...
Turmoil in Libya: Major Industries Hit by Massive DDoS Attacks
I. Background In August, NSFOCUS Global Threat Hunting System spotted an abnormal trend of DDoS attacks against Libya. NSFOCUS Security Labs sorted out the traffic changes of DDoS attacks in August and ...
Introduction to ADS’s HTTP Keyword Checking Policy
HTTP Keyword Checking is a process by which ADS controls HTTP traffic through the ADS device. In addition, ADS takes a specific action (Accept, Drop, Disconnect, Add to blacklist, Add to whitelist, ...