Archive: 2016

Could Volumetric DDoS Attacks Shut Down the Internet?

Many people are now asking the question, were the 2016 DDoS attacks just warm-up drills or test runs for even larger attacks that would cripple large parts of the Internet? The potential certainly exists; is it probable?

Read more

5 Cyber Security Questions to Ask an Internet Service Provider

Business depends upon Internet reliability and security, so when it comes to choosing your Internet Service Provider (ISP), it pays to ask the right questions. Given the prevalence of DDoS attacks, one can no longer assume that that your Internet service will be 1) always reliable or 2) “clean.”  

Read more

DDoS-for-Points: How to Beat Hackers at Their Own Game

DDoS attacks are popular among online game players, and recently a Turkish hacker created a game that rewards players for launching DDoS attacks against a set of political websites.

Read more

Traditional Layers of Defense Are Not Enough to Stop DDoS Attacks

Although DDoS mitigation solutions have been around for nearly 20 years, there are still some myths about DDoS attacks and much debate about how to best protect a network.

Read more

DDoS Attack Predictions for 2017

What challenges and changes will 2017 bring to the DDoS threat landscape? And why is there reason to be optimistic that the number of volumetric DDoS attacks will decrease in the next few years? Read our predictions for 2017.

Read more

The Link Between DDoS Attacks & Security Breach Dwell Time

The costs of security breaches are infamous, and the methods are myriad, constantly evolving. One might ask, how could a security breach go unnoticed, especially for long periods of time?

Read more

DDoS Hackers for Hire

Unfortunately, just in the past few weeks it’s become exponentially easier to launch a massive DDoS attack. There are two reasons for this evolution.

Read more

The Dangers of Underestimating DDoS Attacks

Organizations should be wary of being quick to claim that their business systems have not been affected by a DDoS attack, because this can be extremely difficult to ascertain.

Read more

DDoS Attacks on Critical Infrastructure

Could a DDoS attack cause a long-term disruption of industrial control systems, which operate or monitor much of the nation’s critical infrastructure?

Read more

How to Handle Terabit-Scale DDoS Attacks

In the wake of so many DDoS attacks in recent months/years, many enterprises and agencies are seeking ways to protect themselves from such attacks, and the burden of stopping DDoS attacks should fall mostly on Internet Service Providers and Hosting Providers.

Read more

DDoS Attacks Open the Door to Ransomware

Short DDoS attacks might seem harmless, in that they don't cause extended periods of downtime. But IT teams who choose to ignore them are effectively leaving their doors wide open for ransomware attacks or other more serious intrusions.

Read more

BlackNurse DoS Attack – What You Should Know

Researchers have warned that a low-volume BlackNurse DoS attack can easily take down certain firewalls.

Read more

ISPs Can Stop DDoS Attacks, Without Violating Net Neutrality Laws

In reference to the massive DDoS attack on Dyn, some telecommunications industry experts recently gathered to discuss the issue of “Net Neutrality,” an important and sensitive issue for Internet Service Providers.

Read more

Will Companies Suffer DDoS Attacks on Cyber Monday?

Most of the time, Cyber Monday attacks have taken the form of phishing scams and theft of data such as credit card numbers and email addresses. There have not been many major DDoS attacks on Cyber Monday, but with the way DDoS attack trends are going, there is still reason for concern.

Read more

Cleaning up DDoS at the Network Edge

Hosting providers and/or the tenants they serve experience distributed denial of service (DDoS) attacks on a daily basis. Some attacks are large and noticeable, but the vast majority go unnoticed unless the provider has a granular DDoS detection solution.

Read more

Can DDoS Attacks Be Prevented by Policies or Legislation?

To avoid future DDoS attacks, several U.S. lawmakers have called on the government to improve cyber security protections and consider new rules for web traffic. Would such laws or policies help?

Read more

4 New Trends in the DDoS Threat Landscape

The now infamous DDoS attack on DNS provider DYN broke records for the sheer size of the attack. Unfortunately, the scale of that attack is likely to become commonplace in the near future because of a perfect storm of four trends brewing in cyberspace.

Read more

Help Prevent IoT Devices from Becoming DDoS Botnet Slaves

It’s impossible to make sure that every IoT device is immune to botnet enslavement; however, there are things that companies and consumers can do to make it more difficult for DDoS hackers.

Read more

DDoS Attacks, Security Breaches Validate the Need for National Cyber Security Awareness

It’s very apropos that October is National Cyber Security Awareness Month because this month and the preceding month have been chock full of record-breaking cyber attacks.

Read more

Corero Team Discovers a New DDoS Vector

The Corero research team has discovered a new distributed denial of service (DDoS) Reflection/Amplification attack vector that leverages Connectionless Lightweight Directory Access Protocol (CLDAP UDP:389).

Read more

The Impact of Recent DDoS Attacks Against DNS Infrastructure

Websites across the East Coast were impacted as a result of a reported DDoS attack against a well-known DNS provider’s Infrastructure.  The online availability of popular brands such as Twitter, Spotify, Basecamp, Netflix and a laundry list of others were impacted.

Read more

DDoS Attacks: How Service Providers Can Protect the Media

In the run-up to the US election, we can expect to see more and more of the types of DDoS attack that took Newsweek offline last week. However, these attacks can easily be defeated by service providers, at the network edge.

Read more

Modern or Legacy DDoS Protection? The Important Differences

DDoS attacks have evolved over the years and, thankfully, so has DDoS protection technology. However, not all DDoS solutions are equal.

Read more

Bad News: Bots Thrive on the IoT

The explosion of IoT devices and the release of the "Mirai" code enables more botnet-driven DDoS attacks. However, telecoms can help reduce such attacks.

Read more

Sub-Saturating DDoS Attacks Steal Bandwidth

Sub-saturating, surgical DDoS attacks can be a threat to any organization, but the impact on Service Providers can be even greater.

Read more

The IoT Makes it Easier to Launch Massive DDoS Attacks

Despite its advantages, the Internet of Things (IoT) comes with a host of security disadvantages, allowing hackers to harness connected devices for a variety of nefarious purposes, including DDoS attacks.

Read more

6 DDoS Attack Protection Myths

Having been in the business of DDoS protection for many years, Corero has seen plenty of bad advice thrown around by various cyber pundits. Below we have put together 6 common myths around DDoS protection, and our response to them.

Read more

How DDoS and Malware Could Impact the Voting System

Recent stories in the national media have heightened concerns about the potential for hackers to interfere with the upcoming U.S. elections; how could DDoS attacks play a role?

Read more

SDN and NVF: Blessing or a Curse for DDoS Security?

Software Defined Networks (SDN) and Network Functions Virtualization (NFV) technologies are growing more common, but they are inherently vulnerable to DDoS attacks.

Read more

911 Systems at Risk for TDoS Attack Takedown

Researchers from Ben Gurion University in Israel recently discovered that cyber criminals could launch a telephony denial-of-service (TDoS) attack that could take over thousands of smartphones to form a zombie army of botnets that would automatically dial repeated calls to a 911 system.

Read more

The Links Between Ransom, Ransomware and DDoS Attacks

Of all the cyber threats today, distributed denial of service (DDoS) ransom attacks and ransomware are high on the list of IT security concerns because they are growing more common and they are expensive to remediate.

Read more

Study: 78% of Businesses Not Prepared for Security Breaches

A new study published by international consulting firm KPMG and telecoms group BT recommends that businesses collaborate with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry in a concerted effort to improve cyber security.

Read more

Online Gaming Companies are EA-sy Targets for DDoS Hackers

Recent DDoS attacks on Blizzard and EA servers highlight the vulnerability of the online gaming industry. Fortunately, gaming companies— or, for that matter, all companies that rely on a continuous online presence— now have better choices that can deliver near-instantaneous protection.

Read more

Why is the UK a Prime Target for DDoS Attacks?

Reports surfaced last week that the UK has now become the world’s second most targeted nation for DDoS attacks, following a 220% rise in the number of attacks globally in the last year.

Read more

Choose Your Network Threat Defenses Wisely

Ransomware, Trojans, Malware, and distributed denial of service (DDoS) attacks are some of the most common types of threats. Each has different vectors and flavors, and each brings its own risks and costs. IT pros clearly need multiple layers of security, but which layers are most important?

Read more

Lessons Learned from the Australian Census DDoS Attack

After the DDoS attack on Australian Bureau of Statistics, what can we learn from it? The incident highlights the importance of having DDoS protection at the network perimeter, as well as reliable analytics and clear visibility in the event of a DDoS attack.

Read more

Strategies Shifting for DDoS DNS Amplification Attacks

New research presented at the Black Hat conference indicates that DDoS DNS amplification attacks are now more likely to use SSDP than NTP, and that DDoS attacks may generally be smaller than are commonly reported.

Read more

Improper Network Configuration Can Lead to DDoS Attacks

Recent research found that cyber attackers can launch DDoS attacks by abusing improperly configured DNSSEC (Domain Name System Security Extensions) domains. Learn how to protect your network, whether it includes DNS service or not.

Read more

Does “DDoSCoin” Crypto Currency Encourage More DDoS Attacks?

Recent academic research reinforces the fact that DDoS attacks are not going away, especially if hackers are rewarded with crypto currency.

Read more

Customers Want “Clean Pipe”

If your water utility delivered contaminated water into your home, you’d probably complain; of course consumers expect clean, potable water from their water utilities. Likewise, enterprise customers have begun to realize that “dirty” Internet traffic threatens their availability, security and bottom line, so they increasingly demand “clean pipe” from their Internet Service Providers (ISPs).

Read more

DDoS Attacks Plague Olympic & Brazilian Government Websites

When the Rio Olympic Games began last week, several websites associated with the Games and the Brazilian government were hit by DDoS attacks. But beware; hackers don't attack only high-profile websites.

Read more

A Blizzard of DDoS Attacks on the Gaming Industry

It may be summertime in the Northern Hemisphere, but the first week of August has been marked by a blizzard. A virtual blizzard, that is, of DDoS attacks on some gaming companies.

Read more

NATO Declares the Internet a War Zone

NATO recently published a Cyber Defense Pledge, recognizing the growing threat of nation state cyber warfare and the need for greater cyber security and collaboration among allies.

Read more

Corero Emphasizes Network Threat Protection at HostingCon 16

This year the leading conference for hosting providers featured an emphasis on cyber security and network protection, with many attendees interested in adding DDoS mitigation to their portfolio of services.

Read more

Need for ISP DDoS Protection Demonstrated in Mumbai Attack

A DDoS attack on an Internet Service Provider (ISP) earlier this week crippled Internet service throughout Mumbai, India, which clearly demonstrated why it’s so important for ISPs to have DDoS protection.

Read more

Automated DDoS Protection Hardware Fills a Gap in Network Security

There is no shortage of cyber threats, but there is a shortage of trained IT security personnel to guard against them. With automated DDoS mitigation in place, IT security staff would have more time to handle other cyber security threats.

Read more

DDoS Attacks Temporarily Stop Pokémon GO

The popularity of the online game Pokémon GO has exploded like wildfire in a matter of days (as anyone who does not live under a rock knows). It took only a few days for cyber hackers to find a way to cripple the online game with two apparently separate DDoS attacks that caused service disruptions and outages.

Read more

5 Tips: DDoS Protection for Hosting Providers

New anti-DDoS technology is not only more effective than ever, it’s also more affordable. Here's a list of five tips to guide hosting providers in their strategy to protect their networks and their customers’ networks from DDoS.

Read more

DDoS Attack Trends in the Gaming Industry

From historic DDoS attacks against the PlayStation Network to the recent sustained attacks against Blizzard, DDoS attacks have become such a regular occurrence in the gaming industry that it has almost become an accepted part of the culture. This blog looks at a few commonalities that indicate how and why these attacks occur.

Read more

Small DDoS Attacks Cause Big Problems

Most DDoS attacks are not large, volumetric attacks, and DDoS hackers target all kinds of organizations, not only big, household name companies or government agencies. No website or online application is immune to DDoS, and any size DDoS attack is cause for alarm. You see, DDoS is not just a web availability issue; it’s a security issue.

Read more

IT Security Professionals Want Better DDoS Protection from Service Providers

Corero polled over 100 IT security professionals at the Infosecurity Europe 2016 conference in London last month, and the survey shows that UK businesses are not only worried about DDoS attacks, they want better protection from their Internet Service Providers.

Read more

Meet Corero’s Family of DDoS Mitigation Hardware

If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.

Read more

Massive Botnet Attack Proves That Firewalls Offer No DDoS Protection

A massive botnet DDoS attack, composed of approximately 25,500 compromised closed-circuit television (CCTV) systems, has been ongoing for the past few weeks, attacking various businesses across the globe. A firewall offered no protection.

Read more

New Report Points to Alarming DDoS Attack Statistics and Projections

A new report from Cisco includes data on DDoS attacks worldwide, citing increased size and frequency of attacks. However, Corero finds that the vast majority of attacks targeting customers are 1Gbps or less in size.

Read more

DDoS Protection Increases Customer Retention for Telecoms

Retaining and growing accounts for existing customers is much easier than gaining new ones, particularly in the telecommunications industry, which has significant turnover. But which technologies offer the greatest opportunities for this kind of advancement?

Read more

Cyber Criminals Sell Compromised Servers to Carry Out DDoS Attacks

A major underground marketplace is selling access to more than 70,000 compromised servers, allowing buyers to carry out widespread cyberattacks around the world.

Read more

What Bank Executives Need to Know about DDoS Protection

A recent KPMG study showed that 1 in 10 banking executives didn't know if their bank had been hacked. Bank executives need to realize how easily hackers breach networks by using Dark DDoS attacks as a smokescreen.

Read more

Can The Criminal Justice System Thwart Botnet-Driven DDoS Attacks?

In mid-May three senators on Capitol Hill introduced a bill (S.2931 - Botnet Prevention Act of 2016) that aims to give law enforcement and the courts more teeth when it comes to going after cybercriminals, especially those that launch botnet-drive DDoS attacks. It's a nice idea, but will it work?

Read more

A DDoS Mitigation Appliance Blocks Attacks

In a recent survey, 30% of respondents said their enterprise relies on traditional security infrastructure products (firewall, IPS, load balancers) to protect their businesses from DDoS attacks. Unfortunately, those companies are still very vulnerable to DDoS attacks.

Read more

Dark DDoS Attacks Often Mask Security Breaches

It's a challenge for network security professionals to detect, never mind block, every intrusion. What’s troubling is how much time it can take for an organization to realize that its security system has been breached.

Read more

Cyber Security & DDoS Protection: Major Themes at Big Communications Event

At last week's Big Communications Event, the annual gathering of experts in the telecoms and communications industry, one major topic was how to secure the provider network and protect downstream customers from cyber threats.

Read more

Automated DDoS Protection Reduces Costs & Prevents Downtime

Human intervention is insufficient for most cyber security attacks because humans can’t immediately see every attack, and they certainly can’t respond fast enough (in real time) to block all infiltrations.

Read more

Does Artificial Intelligence Apply to Network Security and DDoS Attacks?

Human intervention alone is no longer sufficient to stop cyberattacks. However, it’s important to recognize that not all software techniques that are automatic or reactive should be classified as Artificial Intelligence.

Read more

All Gigs Are Not Created Equal: DDoS Protection Makes a Difference for ISPs

When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.

Read more

Anonymous Launches DDoS Attacks on Banks in "Op Icarus"

Banks across the globe need maximum security not only for their safes and vaults, but also for their networks.

Read more

Benefits of Real-Time DDoS Protection

If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.

Read more

Breaking the Bank: DDoS Hackers Unleash Their Fury on Financial Institutions

The recent Anonymous DDoS attacks on international banks prove that financial institutions should be more proactive, rather than reactive, in handling DDoS attacks.

Read more

Key Components of Our DDoS Monitoring Tool for Virtual Machines

Corero’s latest product, the SmartWall® Threat Defense - Virtual Edition (vNTD Monitor), allows service providers who are looking to scale out their security analytics environment to simply “drop” security visibility into any part of their network to analyze the nature of a threat.

Read more

Distributed Denial of Service Attacks are Preventable!

A news story about the recent DDoS attack on the Hawaii Better Business Bureau illustrates common misperceptions about effective DDoS protection.

Read more

Protect Your Network from Cyber Extortion with a DDoS Protection Solution

This week ushered in several news articles about recent DDoS extortions that turned out to be scams conducted by some hackers who pretended to be part of the Armada Collective. Some businesses paid the ransom fee, but they could have avoided the entire problem if they had adequate DDoS protection in place.

Read more

DDoS Protection – Why Hosting Providers Need It!

Hosting providers face increasing pressure to prevent DDoS attacks from infiltrating their networks. Here are three primary reasons why providers need to implement DDoS protection, and three benefits they'll gain from doing so.

Read more

DDoS Attacks Impact the Janet Network & Connected Universities

Last week the Janet Network, the government-funded educational network used by many universities in the United Kingdom, experienced another serious DDoS attack. Universities can’t afford to adopt a “whack-a-mole” approach to DDoS attacks. They need real-time, automatic protection against DDoS attacks to protect network services, maintain availability and protect users and their confidential data.

Read more

Majority of Enterprise Customers Want Better DDoS Protection from ISPs

FierceMarkets and Corero jointly published a new research report based on a survey of ISPs and enterprise customers regarding DDoS mitigation strategies. The report discusses not only the traditional methods of DDoS mitigation, but also the rationale of some ISPs who have not yet adopted more effective anti-DDoS technology.

Read more

DDoS Hackers Using IoT Devices to Launch Attacks

There are millions of connected devices that comprise the Internet of Things (IoT), which leads to many security weaknesses that DDoS hackers can leverage. By using amplification techniques on the millions of very high bandwidth density devices currently accessible, such as baby video monitors and security cameras, DDoS attacks are set to become even more colossal in scale.

Read more

DDoS Mitigation as a Service Offering for Telecoms

For today’s internet-driven businesses, any service degradation or outage can have a detrimental impact on brand, customer loyalty and the bottom line. Increasingly, such incidents are being caused by Distributed Denial of Service (DDoS) attacks, and this is one area where telecoms can take leadership.

Read more

Hosting Providers Can Capitalize on DDoS Protection as a Service

The majority of hosting provider customers expect the provider to ensure “clean pipe.” Here's a summary of a webinar that we co-presented with Web Host Industry Review (WHIR), which discusses how hosting providers can implement the most comprehensive level of DDoS protection to eliminate DDoS attack traffic from their networks, and offer that DDoS protection as a value-added service to their customers.

Read more

DDoS Mitigation Solutions & MSSPs Work Together to Keep SMBs Safe

Cyber attacks are on the rise, affecting all kinds of organizations, yet there is a shortage of cybersecurity employees who know how to prevent and manage cyber threats. Small to medium-sized businesses are increasingly turning to Managed Security Service Providers (MSSPs) for help.

Read more

Corero Receives “Recommended” Rating in NSS DDoS Prevention Solutions Security Value Map

Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.

Read more

Survey: DDoS Attacks Cause Loss of Customer Trust & Decreased Revenues

We've released the results of our annual DDoS Impact Survey, which polled technology decision makers, network operators and security experts about key DDoS issues and trends that Internet service providers and businesses face in 2016. Nearly half (45%) of the survey participants indicated that loss of customer trust is the most damaging consequence of DDoS attacks to businesses. See our infographic that sums up rest of the survey results!

Read more

Cyber Warfare or Hacktivism? DDoS Attacks Can Be Used Either Way

Recent DDoS attacks on government and corporate websites in Sweden, Finland and Switzerland illustrate that DDoS can be used as either cyber warfare or political hacktivism.

Read more

Researchers Discover New Vector for DDoS Amplification Attacks

Researchers in Scotland have found a new vector for DDoS amplification attacks: the TFTP protocol (Trivial File Transfer Protocol). Thus far it appears that hackers have not relied heavily on the TFTP protocol; however, you can be sure it will become popular with DDoS attackers.

Read more

The Dangers of Short-Duration, Sub-Saturating DDoS Attacks

Many organizations aren’t even aware of when their sites are experiencing a DDoS attack, because the majority of attacks are under 1 Gbps, and are perceived as only annoying “noise” in the IT background; the attacks are not large enough to get the attention of IT security staff. That doesn’t mean they should be ignored, however. Unseen, low-level DDoS attacks cause two problems.

Read more

DDoS Mitigation Service Provider, Staminus Suffers a Major Security Breach

Staminus, a global hosting and Web security firm, suffered a major blow late last week when it became the victim of a security breach. Staminus is a hosting provider and provider of cloud-based DDoS mitigation services.

Read more

Department of Homeland Security Supports Anti-DDoS Efforts

Give the U.S. federal government credit for attempting to find more broad-based solutions to the global problem of DDoS attacks. We reported a few months ago that DARPA is soliciting research projects on innovative ways to create resilient defenses against DDoS attacks. Now the Department of Homeland Security (DHS) is getting in on the act as well.

Read more

How Corero Protects Against Blended DDoS Attacks

DDoS attacks come in various forms, and hackers have become more sophisticated by launching blended attacks that combine three, four or five types of attacks at the same time. Fortunately, the Corero SmartWall Threat Defense System (TDS) defends against all of them. A recent 75Gbps combined ACK and SYN flood attack on a Corero customer illustrates this point.

Read more

A Telecom Case Study: Deployment of DDoS Mitigation Solution

In a recent webinar hosted by IHS on “Service Provider Deployment of DDoS Mitigation,” Stephen Clark, Director of IP Networks at Telesystem, explained that Block Communications implemented the Corero SmartWall® Threat Defense System on each of its vital interconnects to Tier 1 providers. The solution is in-line deployment of automatic DDoS mitigation that stops malicious traffic at the peering edge. “We can protect our networks at the gate, in real-time,” said Clark.

Read more

Introducing the Corero Virtual Edition (vNTD) Monitor – a DDoS Detection Engine

Last week we announced a new product: vNTD Monitor, which provides the freedom and flexibility to monitor DDoS activity in real-time against any server, application or network. This industry-leading technology provides visibility of attack traffic, intuitive analytics and alerting of DDoS attack vectors targeting a system or workload.

Read more

How to Win the DDoS Game

Xbox Live is again making headlines, but not in a good way. Earlier this week the company suffered various service outages that kept thousands of Xbox gamers at bay. The rumor—unconfirmed by Xbox Live—is that the outages may have been caused by a series of distributed denial of service (DDoS) attacks. Regardless of whether this incident was caused by a DDoS attack, it is well-known that DDoS hackers love to wreak havoc with online gaming companies.

Read more

A Security Guide for Next Generation Service Provider Network Architecture

In the typical service provider network today, security is often an afterthought; after building the network, engineers typically add encryption and firewalls, neither of which is sufficient to protect against the increasing malware and DDoS attacks that plague networks and service functions.

Read more

Clear and Comprehensive Visibility into DDoS Attack Mitigation

Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.

Read more

Distributed Denial of Service Attacks Caused 22% of Unplanned Data Center Outages in 2015

The “2016 Cost of Data Center Outages Report,” published recently by Emerson Network Power in conjunction with the Ponemon Institute, states that unplanned data center outages cost companies nearly $9,000 per minute, and the second most common cause of outages was cybercrime, specifically Distributed Denial of Service (DDoS) attacks.

Read more

In-Line, Always-On DDoS Protection Makes Sense for Service Providers

It's not practical or cost effective to handle DDoS attacks with a swing to a cloud scrubbing service; they must be mitigated locally to maintain availability, performance and latency.

Read more

The Cybersecurity Issue Gets Attention from the White House

President Obama's announcement of a Cybersecurity National Action Plan is an important step towards protecting the American public from the ever-growing threat of cyber attacks.

Read more

Going After the People Behind DDoS Attacks

There are two aspects of fighting DDoS attacks. One is remediation—stopping the attack when it comes in. Corero and other providers have this part of the equation covered. The other aspect of stopping attacks has to do with law enforcement, which can be done only with the help and support of the victim companies.

Read more

DDoS Attacks Rise in Size, Sophistication and Frequency

Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.

Read more

Mitigating Multi-Vector DDoS Attacks

Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.

Read more

DDoS Mitigation Solutions Have Evolved from Cost Item to Revenue Opportunity

Now that DDoS mitigation solutions are more affordable and scalable, there is opportunity to not only save on operational and bandwidth costs, but also to generate new revenue. Service providers can turn mitigation structure around to re-sell it as a service to their customers downstream.

Read more

On the Upswing: Cyber Insurance to Cover the Liability of DDoS Attacks

Cyber insurance is not a substitute for making smart investments in cyber security and following industry best practices. However, it is an important part of almost any business's risk mitigation strategy.

Read more

What Motivates DDoS Attackers?

Whether motivated by greed, cheap thrills or politics, DDoS hackers wreak havoc on websites. The best protection is prevention: defensive solutions that can detect and stop DDoS hackers in their tracks before they do any damage.

Read more

This new hacktivism tactic makes every organization with a web presence a potential target for a DDoS attack

Hacktivism is on the rise as a motivation behind numerous DDoS attacks. For whatever reason, groups like Anonymous, Lizard Squad, Syrian Electronic Army, Chaos Computer Club and others believe they can intimidate corporations, government agencies, and other institutions by knocking these entities' websites offline for a period of time. One of the latest victims of a hacktivist attack is the Japanese carmaker Nissan.

Read more

DDoS Attacks Lead to Downtime and Lost Revenue for Hosting Providers

Corero is pleased to note that one of our customers, InMotion Hosting, has won PC Mag’s Editor’s Choice Award for The Best Web Hosting Services for 2016. One of the key factors for the win was uptime, which is increasingly recognized as the most important feature that hosting providers must offer to website customers. After all, if a customer’s website goes down, it’s difficult, if not impossible, for that customer to conduct business.

Read more

DDoS Rings in the New Year With a Vengeance

High profile DDoS attacks rang in the new year in full force, starting 2016 with a flood (no pun intended) of activity. The morning of New Year’s Eve, BBC websites and other associated online services went dark due to a DDoS attack. Since the outage, hacker group “New World Hackers” have stepped forward claiming responsibility, indicating that the attack was carried out as a “test of its capabilities”.

Read more