Six ‘Lessons Learned’ For Mitigating DDoS Attacks

The world of DDoS is dynamic and evolving. So, when considering the most important features that a DDoS Mitigation should have, it’s always worth examining them in light of recent trends and applying some lessons learned. That, however, can be a rather time-consuming assignment. But worry not. We’ve done the hard work for you. Here’s…

Read More

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access to your hard disk before it hid itself away in memory. Due to its ability to camouflage itself solely in…

Read More

Could IPv6 Result in More DDoS Attacks?

With the growing popularity of IPv6 (Internet Protocol Version 6), so the possibility of this protocol providing a gateway for Distributed Denial of Service (DDoS) attacks has also increased. Developed by the Internet Engineering Task Force (IETF) to replace the forthcoming exhaustion of IPv4, IPv6 became a Draft Standard in December 1998, and was defined…

Read More