Diagram illustrating the Meris botnet's<span class= DDoS attack process, showing infected devices, command and control servers, and the target server under attack." srcset="https://www.corero.com/wp-content/uploads/2023/06/ddos_botnet_meris-300x168.png 300w, https://www.corero.com/wp-content/uploads/2023/06/ddos_botnet_meris-1024x574.png 1024w, https://www.corero.com/wp-content/uploads/2023/06/ddos_botnet_meris-768x430.png 768w, https://www.corero.com/wp-content/uploads/2023/06/ddos_botnet_meris.png 1456w" sizes="(max-width: 300px) 100vw, 300px" />
Blog Posts

What To Know about the Meris DDoS Botnet

Blog graphic emphasizing the importance of<span class= DDoS protection for customer demand and uptime" srcset="https://www.corero.com/wp-content/uploads/2021/06/DDoS-Protection-Meet-Customer-Demand-Uptime-blog-300x200.jpg 300w, https://www.corero.com/wp-content/uploads/2021/06/DDoS-Protection-Meet-Customer-Demand-Uptime-blog-768x512.jpg 768w, https://www.corero.com/wp-content/uploads/2021/06/DDoS-Protection-Meet-Customer-Demand-Uptime-blog.jpg 1000w" sizes="(max-width: 300px) 100vw, 300px" />
Blog Posts

How Is it Possible to Defend Against Zero-Day DDoS Attacks?