Hosting Provider DDoS Protection Posts

Bursts, Waves and DDoS: What You Need to Know

A recent Cisco report found that 42 percent of organizations experienced “burst” distributed denial of service (DDoS) attacks in 2017.

Read more

Minding Your MANRS

Maintaining the resilience and stability of the global Internet requires collaborative efforts between Internet Service Providers (ISPs), government agencies, enterprises, security vendors and end users.

Read more

DDoS Attacks on Internet Providers Can Impact Downstream Customers

Enterprises need to consider that even if they have protection against distributed denial of service (DDoS) attacks, their business could be taken offline if their Internet Service Provider (ISP), hosting provider or Domain Name Service (DNS) provider does not have adequate DDoS protection.

Read more

Benefits of Automatic DDoS Protection in a Hosting Environment

It’s relatively easy for hackers to launch distributed denial of service (DDoS) attacks against a web hosting provider, because they have such large attack surfaces.

Read more

Attack Detection: The Crucial First Step in DDoS Mitigation

If your IT security system fails to detect and block the majority of DDoS attacks, how can you be sure that your network is truly safe from other incursions?

Read more

Service Providers Can Offer Per-Customer DDoS Attack Dashboards

Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.

Read more

DDoS Attacks: The Changing Legal and Regulatory Landscape

Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.

Read more

DDoS-For-Hire Services Under the Spotlight

The rise of DDoS-for-hire botnets has caused an explosion of attacks, partly due to their cheap price point – they can be launched for just a few dozen dollars per month.

Read more

Why Real-Time DDoS Mitigation Is Essential for Your Network Security

If you think your network is safe from distributed denial of service (DDoS) attacks just because your website or web application has not been taken offline, think again. The cyber threat landscape continues to evolve dramatically. In terms of DDoS attack trends, two things have happened.

Read more

Survey Says Businesses Want DDoS Protection from ISPs

Corero conducted a survey of decision makers and security experts, to get a pulse on industry concerns about DDoS attacks in 2017. Learn about the results!

Read more

What is the Benefit of Real-Time DDoS Mitigation? Let a Corero Customer Tell You!

The following post is contributed by our friends at Zare, a UK based hosting provider for quality, affordable and DDoS protected dedicated hosting solutions.

Read more

Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats.

Read more

Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data

Several months after the now-infamous DDoS attack on DNS provider Dyn last October, the incident continues to make headlines. Earlier this month, reports emerged about the scale of customer losses that the company experienced in the wake of the attack. According to security ratings provider, BitSight, roughly 8% of Dyn’s customer base stopped using their services in the aftermath of the attack.

Read more

An Economical Approach to DDoS Attack Protection for Hosting & Service Tenants

Corero's new product, the SmartWall® Service Portal, enables Internet Service providers and hosting providers to offer DDoS Protection as-a-Service (DDPaaS) to their tenants in a flexible and economic model. A few years ago, such DDoS technology was not available; now, it’s the wave of the future.

Read more

Increased Risks of DDoS Attacks for Ransom to Businesses

DDoS extortion campaigns are a common tool in the cyber-threat arsenal, and one of the easiest ways for an attacker to turn a quick profit. When service availability is threatened, the victim company needs to consider the potential loss in downtime, revenues and brand damage.

Read more

How DDoS Attacks Impact Hosting Providers [Part 2] – Data Security

On its own, a DDoS attack is not a security breach; however, it can pose a serious data security risk for hosting providers and others. Learn why IT security teams cannot afford to ignore DDoS threats, no matter how small the attacks may be.

Read more

How DDoS Attacks Impact Hosting Providers [Part 1] – Web Availability

Most hosting providers experience DDoS attacks on a nearly daily basis, even if they are typically not volumetric attacks that drag down an entire network. When a hosting provider gets hit with a volumetric attack, the ramifications can be far-reaching and long-lasting.

Read more

BlackNurse DoS Attack – What You Should Know

Researchers have warned that a low-volume BlackNurse DoS attack can easily take down certain firewalls.

Read more

Cleaning up DDoS at the Network Edge

Hosting providers and/or the tenants they serve experience distributed denial of service (DDoS) attacks on a daily basis. Some attacks are large and noticeable, but the vast majority go unnoticed unless the provider has a granular DDoS detection solution.

Read more

DDoS Attacks, Security Breaches Validate the Need for National Cyber Security Awareness

It’s very apropos that October is National Cyber Security Awareness Month because this month and the preceding month have been chock full of record-breaking cyber attacks.

Read more

The Impact of Recent DDoS Attacks Against DNS Infrastructure

Websites across the East Coast were impacted as a result of a reported DDoS attack against a well-known DNS provider’s Infrastructure.  The online availability of popular brands such as Twitter, Spotify, Basecamp, Netflix and a laundry list of others were impacted.

Read more

Study: 78% of Businesses Not Prepared for Security Breaches

A new study published by international consulting firm KPMG and telecoms group BT recommends that businesses collaborate with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry in a concerted effort to improve cyber security.

Read more

Corero Emphasizes Network Threat Protection at HostingCon 16

This year the leading conference for hosting providers featured an emphasis on cyber security and network protection, with many attendees interested in adding DDoS mitigation to their portfolio of services.

Read more

5 Tips: DDoS Protection for Hosting Providers

New anti-DDoS technology is not only more effective than ever, it’s also more affordable. Here's a list of five tips to guide hosting providers in their strategy to protect their networks and their customers’ networks from DDoS.

Read more

DDoS Attack Trends in the Gaming Industry

From historic DDoS attacks against the PlayStation Network to the recent sustained attacks against Blizzard, DDoS attacks have become such a regular occurrence in the gaming industry that it has almost become an accepted part of the culture. This blog looks at a few commonalities that indicate how and why these attacks occur.

Read more

Meet Corero’s Family of DDoS Mitigation Hardware

If you’re doing research about DDoS protection solutions there are many choices out there, and it can be challenging to find the solution that best fits your organization. Learn about the pros and cons of scrubbing service vs. cloud-based mitigation vs. DDoS mitigation appliances.

Read more

A DDoS Mitigation Appliance Blocks Attacks

In a recent survey, 30% of respondents said their enterprise relies on traditional security infrastructure products (firewall, IPS, load balancers) to protect their businesses from DDoS attacks. Unfortunately, those companies are still very vulnerable to DDoS attacks.

Read more

Cyber Security & DDoS Protection: Major Themes at Big Communications Event

At last week's Big Communications Event, the annual gathering of experts in the telecoms and communications industry, one major topic was how to secure the provider network and protect downstream customers from cyber threats.

Read more

Automated DDoS Protection Reduces Costs & Prevents Downtime

Human intervention is insufficient for most cyber security attacks because humans can’t immediately see every attack, and they certainly can’t respond fast enough (in real time) to block all infiltrations.

Read more

All Gigs Are Not Created Equal: DDoS Protection Makes a Difference for ISPs

When evaluating an Internet Service Provider, it’s important to consider the quality, as well as quantity, of bandwidth it offers. How effectively a provider protects its customers from Distributed Denial of Service (DDoS) attacks can have a dramatic impact on the quality of Internet service.

Read more

Benefits of Real-Time DDoS Protection

If your organization is debating the merits of a DDoS protection appliance compared to a DDoS scrubbing service, this blog post offers a short explanation of the key differences between these types of DDoS solutions.

Read more

Key Components of Our DDoS Monitoring Tool for Virtual Machines

Corero’s latest product, the SmartWall® Threat Defense - Virtual Edition (vNTD Monitor), allows service providers who are looking to scale out their security analytics environment to simply “drop” security visibility into any part of their network to analyze the nature of a threat.

Read more

Protect Your Network from Cyber Extortion with a DDoS Protection Solution

This week ushered in several news articles about recent DDoS extortions that turned out to be scams conducted by some hackers who pretended to be part of the Armada Collective. Some businesses paid the ransom fee, but they could have avoided the entire problem if they had adequate DDoS protection in place.

Read more

DDoS Protection – Why Hosting Providers Need It!

Hosting providers face increasing pressure to prevent DDoS attacks from infiltrating their networks. Here are three primary reasons why providers need to implement DDoS protection, and three benefits they'll gain from doing so.

Read more

DDoS Hackers Using IoT Devices to Launch Attacks

There are millions of connected devices that comprise the Internet of Things (IoT), which leads to many security weaknesses that DDoS hackers can leverage. By using amplification techniques on the millions of very high bandwidth density devices currently accessible, such as baby video monitors and security cameras, DDoS attacks are set to become even more colossal in scale.

Read more

DDoS Mitigation as a Service Offering for Telecoms

For today’s internet-driven businesses, any service degradation or outage can have a detrimental impact on brand, customer loyalty and the bottom line. Increasingly, such incidents are being caused by Distributed Denial of Service (DDoS) attacks, and this is one area where telecoms can take leadership.

Read more

Hosting Providers Can Capitalize on DDoS Protection as a Service

The majority of hosting provider customers expect the provider to ensure “clean pipe.” Here's a summary of a webinar that we co-presented with Web Host Industry Review (WHIR), which discusses how hosting providers can implement the most comprehensive level of DDoS protection to eliminate DDoS attack traffic from their networks, and offer that DDoS protection as a value-added service to their customers.

Read more

Corero Receives “Recommended” Rating in NSS DDoS Prevention Solutions Security Value Map

Corero SmartWall® Threat Defense System (TDS) earned a top position in the latest NSS Labs DDoS Prevention Group Test, earning the coveted “Recommended” rating, with high performance in all test categories.

Read more

Survey: DDoS Attacks Cause Loss of Customer Trust & Decreased Revenues

We've released the results of our annual DDoS Impact Survey, which polled technology decision makers, network operators and security experts about key DDoS issues and trends that Internet service providers and businesses face in 2016. Nearly half (45%) of the survey participants indicated that loss of customer trust is the most damaging consequence of DDoS attacks to businesses. See our infographic that sums up rest of the survey results!

Read more

The Dangers of Short-Duration, Sub-Saturating DDoS Attacks

Many organizations aren’t even aware of when their sites are experiencing a DDoS attack, because the majority of attacks are under 1 Gbps, and are perceived as only annoying “noise” in the IT background; the attacks are not large enough to get the attention of IT security staff. That doesn’t mean they should be ignored, however. Unseen, low-level DDoS attacks cause two problems.

Read more

DDoS Mitigation Service Provider, Staminus Suffers a Major Security Breach

Staminus, a global hosting and Web security firm, suffered a major blow late last week when it became the victim of a security breach. Staminus is a hosting provider and provider of cloud-based DDoS mitigation services.

Read more

How Corero Protects Against Blended DDoS Attacks

DDoS attacks come in various forms, and hackers have become more sophisticated by launching blended attacks that combine three, four or five types of attacks at the same time. Fortunately, the Corero SmartWall Threat Defense System (TDS) defends against all of them. A recent 75Gbps combined ACK and SYN flood attack on a Corero customer illustrates this point.

Read more

Introducing the Corero Virtual Edition (vNTD) Monitor – a DDoS Detection Engine

Last week we announced a new product: vNTD Monitor, which provides the freedom and flexibility to monitor DDoS activity in real-time against any server, application or network. This industry-leading technology provides visibility of attack traffic, intuitive analytics and alerting of DDoS attack vectors targeting a system or workload.

Read more

Clear and Comprehensive Visibility into DDoS Attack Mitigation

Whether they are online enterprises, hosting providers or Internet service providers, companies need 24/7 insight into their network security, particularly regarding DDoS attacks and other cyber threats that target their Internet-facing services.

Read more

Distributed Denial of Service Attacks Caused 22% of Unplanned Data Center Outages in 2015

The “2016 Cost of Data Center Outages Report,” published recently by Emerson Network Power in conjunction with the Ponemon Institute, states that unplanned data center outages cost companies nearly $9,000 per minute, and the second most common cause of outages was cybercrime, specifically Distributed Denial of Service (DDoS) attacks.

Read more

In-Line, Always-On DDoS Protection Makes Sense for Service Providers

It's not practical or cost effective to handle DDoS attacks with a swing to a cloud scrubbing service; they must be mitigated locally to maintain availability, performance and latency.

Read more

Going After the People Behind DDoS Attacks

There are two aspects of fighting DDoS attacks. One is remediation—stopping the attack when it comes in. Corero and other providers have this part of the equation covered. The other aspect of stopping attacks has to do with law enforcement, which can be done only with the help and support of the victim companies.

Read more

DDoS Attacks Rise in Size, Sophistication and Frequency

Distributed denial of service (DDoS) attacks are clearly on the rise: growing in size, sophistication and frequency. Any type of website can be preyed upon by a DDoS attacker, and several high-profile websites have been hit in recent weeks, ranging from corporate enterprises and government agencies to educational institutions. In this blog post Corero COO Dave Larson answers questions about these troubling trends.

Read more

Mitigating Multi-Vector DDoS Attacks

Corero's Security Operations Center* team monitors various customer websites 24/7, 365 days per year. They regularly see DDoS attacks in real-time, many of which are so small that they would be unnoticed by the customer if not for the Corero SmartWall® Threat Defense System (TDS). However, they also see very large, multi-vector attacks in progress. This blog includes sample reports of high-volume, multi-vector attacks detected and mitigated in real-time by the SmartWall® Threat Defense System.

Read more

On the Upswing: Cyber Insurance to Cover the Liability of DDoS Attacks

Cyber insurance is not a substitute for making smart investments in cyber security and following industry best practices. However, it is an important part of almost any business's risk mitigation strategy.

Read more

What Motivates DDoS Attackers?

Whether motivated by greed, cheap thrills or politics, DDoS hackers wreak havoc on websites. The best protection is prevention: defensive solutions that can detect and stop DDoS hackers in their tracks before they do any damage.

Read more

This new hacktivism tactic makes every organization with a web presence a potential target for a DDoS attack

Hacktivism is on the rise as a motivation behind numerous DDoS attacks. For whatever reason, groups like Anonymous, Lizard Squad, Syrian Electronic Army, Chaos Computer Club and others believe they can intimidate corporations, government agencies, and other institutions by knocking these entities' websites offline for a period of time. One of the latest victims of a hacktivist attack is the Japanese carmaker Nissan.

Read more

DDoS Attacks Lead to Downtime and Lost Revenue for Hosting Providers

Corero is pleased to note that one of our customers, InMotion Hosting, has won PC Mag’s Editor’s Choice Award for The Best Web Hosting Services for 2016. One of the key factors for the win was uptime, which is increasingly recognized as the most important feature that hosting providers must offer to website customers. After all, if a customer’s website goes down, it’s difficult, if not impossible, for that customer to conduct business.

Read more

DDoS Lessons Learned, and Staying Ahead of These Threats in 2016

The DDoS attack landscape of 2015 has brought a consistent spattering of headlines that further highlight the severity of this type of cyber-attack.

Read more

Carrier Grade NAT and the DoS Consequences

The Internet has a very long history of utilizing mechanisms that may breathe new life into older technologies, stretching it out so that newer technologies may be delayed or obviated altogether. IPv4 addressing, and the well-known depletion associated with it, is one such area that has seen a plethora of mechanisms employed in order to give it...

Read more

Here they come – DDoS attacks via the Internet of Things

Experts have long warned that the inherent lack of security in many of the devices that make up the Internet of Things (IoT) would come back to harm us in the end. Now there is firm evidence that hackers are exploiting weak and default credentials on embedded devices to create botnets that are the sources of DDoS attacks. Closed-circuit...

Read more

ProtonMail Gives in to DDoS Ransom

Last month I published a post in reference to the surge in ransom driven DDoS attacks against Corero’s customers. “Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin ransoms. Through...

Read more

Is DDoS Mitigation as-a-service becoming a defacto offering for providers?

It’s well known in the industry that DDoS attacks are becoming more frequent and increasingly debilitating, turning DDoS mitigation into a mission critical initiative for providers. From the largest of carriers to small and mid-level enterprises, more and more Internet connected businesses are becoming a target of DDoS attacks. What was once...

Read more

Corero Observes Surge in Ransom Driven DDoS Attacks

The Corero Security Operations Center has seen an increase in cyber-extortionists targeting web hosting providers with Bitcoin ransom demands. Over the last thirty days, roughly 10% of Corero’s customer base has been faced with extortion attempts, threatening to take down their websites and services unless they pay out various Bitcoin...

Read more

Rutgers University gets an F for its failure to prevent repeated DDoS attacks

On September 28, 2015, Rutgers University experienced another DDoS attack—the fifth such attack in less than a year. Now some students and parents are asking for a refund of a portion of the tuition they have paid, attributing the demand to the university's inability to keep services available.  You see, the university's Board...

Read more

DDoS Defense Initiatives – It looks like everyone is getting involved!

Over the past few weeks news feeds all over the world have been pulsating about the recent DARPA announcement.  On August 14th, 2015 the U.S. Defense Advanced Research Projects Agency (DARPA) announced an initiative called Extreme DDoS Defense (XD3).  Interestingly enough, DARPA is not the only U.S. government agency calling for research...

Read more

Lizard Squad retaliates against the UK's National Crime Agency following arrests of "customers"

Lizard Squad just can't leave it alone. Last week we reported that the National Crime Agency (NCA) in the United Kingdom arrested a number of teenagers who used Lizard Squad's DDoS tool Lizard Stresser. (See Users of DDoS-as-a-Service are arrested in the UK.) Just days after those arrests, the NCA's website was attacked and...

Read more

Users of DDoS-as-a-Service are arrested in the UK

Back in January I told you about DDoS-as-a-Service, brought to you by the nefarious hacking group known as Lizard Squad.

Read more

Upping Their Game - Three New DDoS Attack Methods already in 2015

The stakes have been raised even higher as organizations prepare for three new methods of DDoS attacks that have emerged in the last six months alone. The reflective/amplified category of DDoS attack has been around for nearly four years, but once again attackers are finding new methods of launching their assaults within this attack...

Read more

DDoS extortion campaigns on the rise

Just recently the Internet Complaint Center (IC3) issued an alert to businesses regarding a rise in extortion campaigns, tied to threats of DDoS attack activity unless a ransom is paid. The rise in DDoS attacks generally, is not surprising at all and the use of the “DDoS threat” for ransom or extortion is not a new tactic in...

Read more

FBI Warning! Businesses Are Threatened with DDoS Attacks Unless Extortion Money Is Paid

If you're running an illegal business that the authorities would like to shut down, you are highly unlikely to call the police or FBI if a cyber attack is affecting your business. And so it is that online operators of "unregulated activities" such as illegal gambling sites are finding themselves to be the victims of extortion...

Read more

If it looks like a duck, quacks like a duck and walks like a duck…

Several high profile organizations experienced ‘unexplained’ service outages yesterday, begging the question “is there any connection across these discrete outages”. All trading on the New York Stock Exchange was halted for nearly four hours for undisclosed internal technical reasons, while a so-called technical glitch halted United Airlines flights around the country for about two hours. The Wall Street Journal’s web site was also rendered unavailable just after the NYSE halted trading.

Read more

Shapes of DDoS Threats

For a device to offer DDoS protection it must be able to handle the different traffic profiles that constitute the current DDoS attack landscape. By illustrating the relative layer 3 and layer 4 counts of source and destination one can easily see the major categories of DDoS Threats. After introducing a basic traffic shape, anomalous variants will...

Read more

Denial of Service Attack Grounds Airplanes for Hours

If you're old enough to remember the turn of the millennium, then you'll recall the big Y2K scare. Many people believed that computers that were never designed to accommodate the change of the millennium – from the year 1999 to 2000 – would have such crazy problems that airplanes in flight might fall out of the...

Read more

The State of Internet Security is Getting Worse, According to Akamai

Akamai is out with its State of Internet Security report for the first quarter of 2015. This report is based on actual, observed traffic as opposed to being the result of user surveys, making it a good record of recent security conditions. The report opens with a very troubling statistic: the number of DDoS attacks recorded in the first quarter...

Read more

The Attack of the Baby Monitors!

Most of us who operate in the world of DDoS attacks have known about the reflective/amplified DDoS attack vector for several years.  As a matter of fact Corero was warning the public that this attack vector was coming nearly 5 years ago; before the first attack of this type was ever observed. Today it seems the attackers will do whatever is...

Read more

Computer Center Serving the UK's University System Has a Lot to Learn

We've posted several articles lately about DDoS attacks being aimed at educational institutions right about the time that important exams are being taken by a large percentage of students. (See Sorry, Kids, Your Final Exam Has Been DDoS'd and  High school student charged with a felony after DDoSing his school district.) Now comes...

Read more

High school student charged with a felony after DDoSing his school district

Sure to be voted "least popular student" in the West Ada, Idaho, school district: the 17 year old kid who took down the district's computer system, forcing students to retake the state mandated achievement test multiple times. In mid May, just as 36,000 students across the district's 52 schools were taking their Idaho Standard...

Read more

Sorry Kids, Your Final Exam Has Been DDoS’d

It’s that time of year when Colleges and Universities are hustling and bustling with year-end activities such as graduation, senior occasions, final athletic events and countless ceremonies. It’s also the time when final exams are well underway. Perhaps it is a coincidence (or maybe quite the opposite) that we are hearing of several...

Read more

Black Hole Routing – Not a Silver Bullet for DDoS Protection

As ISPs, Hosting Providers and Online Enterprises around the world continue suffering the effects of  DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?” Traditional techniques of defense include SYN-cookies, SYN-proxy, redirects, challenges, and...

Read more

Who have you pissed off lately?

One of the prime motivations for DDoS attacks today is hacktivism. That is, some individual or group is trying to inflict revenge or punishment on the targeted company because of political or social beliefs. One of the more famous uses of DDoS as a hacktivist tool is the take-down of Sony Pictures' systems in retribution for the planned...

Read more

The Do-No-Harm Approach to Real-Time DDoS Protection

The vast majority of Corero customers require always on DDoS protection to ensure service availability for their customers—ensuring that all good user traffic flows unimpeded, while DDoS attack traffic is mitigated in real-time.  The Corero SmartWall® Threat Defense System (TDS) allows for always-on DDoS protection with a unique and...

Read more

Man your battle stations – DDoS is pulling a fast one on you

The DDoS threat landscape is a broad, ever evolving and dynamic topic that is covered by many different perspectives. One angle that doesn’t always get the spotlight is the use of DDoS attacks as a diversionary tactic or profiling mechanism for advanced assaults against a target victim. Traditionally the term “DDoS” has been...

Read more

DDoS – whose responsibility is it?

As organizations around the globe become more-and-more reliant on the Internet, a serious weakness has begun to emerge in our connected world.  Since its inception, the Internet has been all about availability; when the Internet goes down, businesses that rely on that availability go down with it. DDoS attacks are single handedly the most...

Read more

Are DDoS attacks getting bigger or smaller?

There has been a flurry of DDoS reports from DDoS protection vendors as of late, and Corero has thrown its hat in the ring as well. The recently released Corero DDoS Trends and Analysis report offers a unique perspective of the growing DDoS threat; offering a stark contrast to the majority of the reports saturating the headlines this month. The...

Read more

Don't Dig a Well When Your House is on Fire

Relying on human intervention to mitigate DDoS attacks is like digging a well when your house is on fire. When it comes to ensuring service availability and maintaining uptime and SLAs, hosting providers should use minimal (if any) manual intervention when defending against a DDoS attack.

Read more

Return on Investment vs. Return on Availability

In my discussions with organizations looking to protect their business from the wrath of DDoS attacks, I often hear the same question, “How do we obtain a Return on Investment (ROI) on a DDoS protection solution?”  Years ago I would attempt to delineate a potential ROI model, often on the fly.  On several occasions, I worked...

Read more

Experiencing Pain you can’t Explain?

Last week I attended the Corero annual sales kickoff at our HQ in Hudson, MA. While there, I had the opportunity to spend several days with one of our most seasoned security engineers, David B.  He was discussing his experience regarding a hosting provider who was currently evaluating the Corero SmartWall® Threat Defense System (TDS) as a...

Read more

The double-edged sword of operating a hosting data center  

The more customers you host in your data center, the better, right?  Of course, that means more revenue.  And if those customers are in multiple industry verticals, even better, correct?  Supporting a variety of customer types protects  against revenue fluctuations if rough economic times affect a certain vertical and not the...

Read more

The biggest threat to your SLAs - DDoS Attacks (Part II)

It’s obvious that latency and outages caused by DDoS attacks can severely impact uptime measurements.  A sustained outage caused by an attack could result in an organization losing or reducing its uptime certifications. The reality of the impact of DDoS to a provider’s APS ratings is staggering if you put it into...

Read more

The biggest threat to your SLAs - DDoS Attacks (Part I)

It is no secret that Hosting Providers live and die by the Service Level Agreements (SLAs) and uptime guarantees they offer to their customers.  Organizations select providers, and remain loyal when SLA thresholds are continuously met.  Hosting Providers are fighting an up-hill battle in striving to meet these aggressive guarantees....

Read more

Hope for the best, but plan for the worst.

From my time spent in the military back in the 1980’s I remember many of the lessons learned.  The title of this blog is one of them. Without a plan, all of the hope in the world solves little, if anything and hope simply cannot replace a good plan. Hope is not a strategy for success. With the recent news pertaining to Lizard Squad...

Read more

The Hacker Group Anonymous as Do-Gooder?

We are usually writing about the hacker group Anonymous in terms of the harmful attacks its members launch against business and government websites. But now the BBC is reporting that Anonymous is claiming credit for knocking a terrorist recruiting website offline. Anonymous is declaring war on jihadist websites following the recent terrorist...

Read more

Interview with Corero CTO, Dave Larson – It’s Game On for DDoS

The Gaming Industry, given its high-volume, high-transactional environment, requires 24/7 accessibility. Any downtime or interruption has a significant financial and reputational impact. The Gaming Industry thrives on the Internet, which makes them especially sensitive to DDoS attacks not only by motivated attackers, but also competitors and poor...

Read more

'Twas the Night Before Payday

Enjoy a little bit of Holiday Fun!  Watch the Video   'Twas the night before payday, when all through the net Most attackers were stirring, increasing the threat. Tomorrow’s targets were chosen, sighted in their crosshairs, In hopes the victims, soon would be theirs.   Evading the law, and even the...

Read more

DDoS Attack left “Sweden not Working”

The recent DDoS attacks impacting Swedish cable, Internet and mobile service provider, TeliaSonera is another grim reminder of the impact a DDoS attack can have not only on the business itself, but the 5 million subscribers that were left without service, and left "Sweden not working", as TeliaSonera’s CEO Johan Dennelind has...

Read more

What Does a DDoS Attack Really Cost? It Depends...

In a recently released report companies estimated the average cost of a successful DDoS attack – one that actually disrupts a target's business – is $40,000 per hour. $40,000 per hour. It's a nice composite number that is easy to present to management when you need to justify a budget for preparing for the potential of a...

Read more

Change is inevitable – Time to re-write the playbook

Hopefully most of you in the industry have noticed that the approach to DDoS protection has changed dramatically over the last few years. What was once considered a good defensive posture is now proving to be sub-par protection against today’s sophisticated and adaptive DDoS attacks.  The days of firewalls, IPS’s and other...

Read more

Why Vendor Risk Management is Critical to Your Business

You've heard the trite expression "A chain is only as strong as its weakest link." Well, it's true, and when it comes to enterprise security, the weakest link might be outside your own organization. Every since it came to light that the Target data breach originated through compromised credentials belonging to a third party...

Read more

Why would anyone launch a DDoS attack against us?

During my travels across the globe I meet lots of people, and it always amazes me when individuals continue to believe that they are not susceptible to a DDoS attack. I frequently hear, “Why would anyone attack us, why should we plan for an impending DDoS attack?”  Believe it or not statistics show that over 40% of online...

Read more

Increased use of Intelligent, Adaptive DDoS Attack Techniques

Many equate DDoS with only one type of attack vector – volumetric. It is not surprising, as these high bandwidth consuming attacks seem to frequent the headlines most often. Volumetric DDoS attacks are easier to identify, and defend against with on-premises or cloud anti-DDoS solutions, or a combination of both. Recently, Corero Network...

Read more

SSDP Amplified Attacks, a Sitting Duck against Sophisticated DDoS Analytics

The craftiness of cyber attackers never ceases to amaze me and now a new kid on the block has emerged – the SSDP Reflective/Amplified DDoS attack.   Many people may wonder what SSDP is.  SSDP otherwise known as the Simple Service Discovery Protocol is a network based protocol used for the advertisement and discovery of network...

Read more

Using sFlow for Security Analytics

sFlow (sampled flow) is a scalable protocol for statistical monitoring of a network.  When used for security monitoring, it can provide valuable insight for establishing baseline behavior and identifying deviations from the baseline.  Security administrators can be alerted when an anomaly is detected and investigate whether new security...

Read more

49½ pounds of DDoS attack visibility

Why is visibility important? The answer is an easy one to deliver. When you’re under a DDoS attack or when one of your customers comes under attack, “end-point pipe” visibility is the key to quick mitigation. You cannot proactively defend a network if you cannot detect, analyze and respond to the attack and this level of visibility is critical to proper DDoS protection.

Read more

Here's a Good Resource for Learning About Encryption Schemes Before You Put Data in the Cloud

If your organization is planning to have data and applications in the cloud, then you are probably planning to use encryption to secure the data. Encryption is a technology that transforms your data into an alternate format that only authorized parties with a decryption key can read. Like most technologies, encryption can be implemented in...

Read more

Victim Company Refuses to Pay DDoS Extortion Fee and Is Permanently Forced Out of Business

If your company relies on your website to conduct any amount of business, it's time to take notice of what has been happening lately with regards to DDoS attacks. In the past few weeks, numerous companies have experienced DDoS attacks in which there is a demand for money in order to stop the attacks. In plain words, extortion. According to...

Read more

First Line of Defense Against DDoS Attacks in a Hosting Environment

Hosting Providers and Datacenters must overcome the challenges associated with a wide range of hosting requirements; maintaining highly available applications, mission critical systems and maximum levels of reliability. Unfortunately, DDoS attacks threaten their ability to do so. This is problematic as a Web hosting, co-location and datacenter...

Read more

Specially Crafted Packet DoS Attacks, Here We Go Again

One of the unique types of Denial of Service (DoS) attacks involves the usage of specially-crafted packets.  Most cybersecurity professionals are already familiar with volumetric and amplified DDoS attacks, but more recent attention has been surrounding fragmented and application-layer DDoS attacks. However, few understand what a...

Read more

Securing the Data Center and Generating Revenue - #Winning

Corero CTO, Dave Larson, spoke recently to an audience of Hosting Providers during a (Web Hosting Industry Review) WHIR hosted webinar event.   Dave addressed the audience alongside WHIR editor, Nicole Henderson, and explained how hosting providers have a new opportunity to increase their revenue and customer base.  After an...

Read more

Attack of the Month Video Blog Series: Blended DDoS Attacks

It’s no surprise that today's hackers are getting increasingly smarter. Unfortunately, traditional defenses aren't enough to fight against the different types of DDoS attacks, which are more sophisticated and common place. Hackers are now carrying out a combination of DDoS attacks, known as Blended DDoS attacks, to maximize...

Read more

The 2014 Verizon Data Breach Investigations Report Includes Recommendations to Control or Prevent DoS Attacks

Have you read the 2014 Verizon Data Breach Investigations Report (DBIR) yet—all 60 pages of it? Actually, if you’re pressed for time, you don’t need to read the whole report cover to cover. This year, Verizon made it easy on security practitioners by segmenting the report into 9 major incident patterns. So, you don’t...

Read more

Finding Needles in the Haystack of Security Events

I hate to throw a cliché at you, but when it comes to security event and log management, a picture (or a handful of pictures) is certainly worth a thousand words.  Security devices generate volumes of raw data, usually in a proprietary manner.  Parsing such unstructured data and making sense out of it is a tedious, if not an...

Read more

Big Things from Small Data

Big data is big, and security vendors across the globe participate in the phenomenon by collecting, slicing, and dicing representative traffic (good and otherwise) on customer networks to better identify, predict, and mitigate attacks on the front lines. Still, for all the data used daily to baseline, extrapolate, and diagnose, it is sometimes...

Read more

What’s Hiding Behind that DDoS Attack?

Multi-vector patterns of DDoS attacks are becoming more commonplace in the world of cyber warfare. From the volumetric attacks aimed to fill your pipe and squeeze your Internet bandwidth down to nothing, to the low and slow application layer attacks that sneak right through traditional defenses – combination attacks are becoming the norm....

Read more

Communications Teams Get a Failing Grade Over Heartbleed

First of all, let me say thank you to the security professionals who are working their butts off to develop patches and permanent fixes for problems caused by Heartbleed. I know this is an extraordinary case of the highest priority. Thank you for using your talents and your time to plug this gaping hole and make your users safe again. That...

Read more

Attack of the Month Video Blog Series: Network Layer Attacks In ICS

In the world of Industrial Control Systems (ICS) system outage or infiltration can result in system downtime, loss of productivity and loss of revenue, as well as loss of confidentiality, integrity and availability. Additionally, system outage or infiltration could possibly result in loss of life often due to the critical nature of these devices....

Read more

NTP Amplification DDoS Attacks Are Skyrocketing. Do You Have Your Defense System in Place?

In his recent “Attack of the Month Video Blog Series,” Stephen Gates talks about NTP reflective traffic as the latest technique being used to launch DDoS attacks against hapless victims. This is certainly something to pay attention to. Since the beginning of 2014, the number of attacks using this method has skyrocketed, largely because...

Read more

Internet Hosting Providers that Fail to Prepare for DDoS Attacks are Derelict in Their Duties to Care for Their Clients

On February 18, 2014, the online gaming website Wurm was the victim of a DDoS attack. The company posted the following note on its website at the time of its attack: "Shortly after today's update we were the target of a DDoS attack and our hosting provider had to pull us off the grid for now. We will be back as soon as possible but...

Read more

Attack of the Month Video Blog Series: Application Layer DDoS Attacks

Happy Valentine's Day everyone. For the LOVE of DDoS defense, I'm pleased to share with you another video blog, this time focused on Application Layer attacks. Today's 5 minute session I will cover Application Layer attacks in more detail: What are these attacks? Why are they an emerging threat, or continue to be a...

Read more

APWG: Nearly Half of All Phishing Attacks Leveraged Hacked Hosting Providers

Hacked hosting providers are becoming a fertile launch pad for new phishing attacks, accounting for nearly half of all phishing incidents during the second half of 2012, according to new research from the Anti-Phishing Working Group (APWG). The fact that these phishing attacks are increasing is not surprising, since based on earlier reports...

Read more

GitHub hit with back-to-back DDoS attacks

It happened...again. In February 2012, GitHub -- the popular code sharing site -- experienced what they called a prolonged and "intense" week long Distributed Denial of Service (DDoS) attack. In a statement at the time, Github said that the "attack is global, and has been very intense at times. Yesterday morning, for example,...

Read more

View earlier posts in the archive