Slammer: 20 years after
Guest Post: Where were you when SQL Slammer nearly broke the Internet? Could it happen again?
Guest Post: Where were you when SQL Slammer nearly broke the Internet? Could it happen again?
Guest Post: How cloud networks can be misused to carry out DNS-based reflection DDoS attacks.
Guest Post: How to semi-automatically generate large amounts of DDoS training data from IXPs.
Guest Post: Learn about three different types of DDoS attacks and how to defend against them.
Guest Post: ACC-Turbo is an open-source, pulse-wave DDoS defence system that runs at line rate, on programmable switches.
Guest Post: Cybercriminals now see home routers as gateways to corporate networks, and companies as potential attack vectors.
Guest Post: More popular websites are more likely to make changes to their name server records following a DDoS attack on their cloud provider.
Guest Post: New routing method uses bandwidth reservations, improving speed and security to meet service-level objectives.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.