Today, 5G is around the corner and, in the foreseeable future, it will definitely bring more convenience to our lives. Higher rates of mobile terminals, more devices connected to the Internet of Things (IoT), more convenient remote services… All these will lead us to a brand new era of the...
Category: Blog
BGP Hijackings Come Back!
A BGP hijacking event happened again! Following the event that the traffic supposed to be destined for Europe was leaked to China Telecom (June 9, 2019), another BGP hijacking occurred yesterday (June 25, 2019). Since Verizon, by mistake, accepted network misconfigurations by a minor Internet Service Provider (ISP), multiple Internet...
IP Reputation Report-07012019
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at June 30, 2019. Top 10 countries in attack percentage: First place changed from Laos to Suriname. The Palestine is in the second place....
Botnet Trend Report-3
This chapter discusses various aspects of botnet behavior. Behavioral characteristics include activity level of botnets overall and per botnet family, DDoS attack characteristics, C&C server use and distribution, and geographical locations of attack victims. Also discussed are characteristics of the most active botnet families themselves. (more…)
DDoS in the Past Decade
1.0Â Â Milestones 1.1Â Â DDoS Size Expansion IP data source: The Zettabyte Era: Trends and Analysis The past decade has witnessed a steady growth in the peak size of DDoS attacks, especially in 2013 when the reflection method was used by attackers on a large scale and the DDoS attack size...
What You Should Know About Mitigation Bypass
Mitigation measures are implemented with many implicit assumptions. They can work only when these assumptions prove to be true and would be bypassed if these assumptions were broken. (more…)





