exclusive content

How a new generation of IoT botnets is amplifying DDoS attacks

Larry Pesce remembers the day when the distributed denial of service (DDoS) threat landscape changed dramatically. It was late fall in 2016 when a fellow researcher joined him at the InGuardians lab, where he is director of research. His friend wanted to see how fast Mirai, a novel internet of things (IoT) botnet installer, would […]

DDoS Attack Threat Landscape — Tracking DDoS Attack Trends in Q2’22

DDoS attacks are on the rise. Ransom attacks reached an all-time high in June 2022, the Ukraine-Russia war provoked new attacks against broadcast media and banking companies, and both application-layer and network-layer attacks rose by over 70% since 2021. Cloudflare analyzes DDoS attacks that are detected and mitigated across our global network — spanning over […]

How To Evaluate Your DDoS Attack Protection

A No-Nonsense Guide to Reliability If your enterprise hasn’t been hobbled by a DDoS (distributed denial of service) attack in the recent past, you may resist the idea of evaluating your DDoS protection. That’s understandable. No one wants to mess with something that’s working. But what worked yesterday may not work tomorrow – particularly when […]

Five best practices for mitigating DDOS Attacks

Distributed denial-of-service (DDoS) attacks remain one of the most effective methods used by cybercriminals to cause significant financial, operational, and reputational damage to businesses worldwide. Though these attacks take different forms, the goal is always to incapacitate targeted servers, services, or networks by flooding them with traffic from compromised devices or networks.   As organizations have […]

DDos attack trends in q1 2021

In March of 2021, Cloudflare introduced our autonomous edge DDoS (Distributed Denial of Service) protection system and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networks’ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All […]