NTP amplification DDoS attack
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…
Your Go-To Source for Cyber Security Insights and Solutions
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…
Say hello to ‘Regular Tuesday’ For many organizations, Patch Tuesday will soon become “just another Tuesday”, because Microsoft is preparing to roll out a new tool that automates the patch…
September has been a packed month of continuous updates. Apple and Microsoft released new operating systems, and several vulnerabilities exploited in web services resulted in a domino effect of zero-day…
Anycast is a network addressing and routing method in which incoming requests can be routed to various locations. What is Anycast? Anycast is a network addressing and routing method in…
CAPTCHAs and reCAPTCHAs determine if a user is a bot. While these tests can help stop malicious bot activity, they are far from foolproof. What is a CAPTCHA? A CAPTCHA…
A reverse proxy protects web servers from attacks and can provide performance and reliability benefits. Learn more about forward and reverse proxies. What is a proxy server? A forward proxy,…
Click fraud fakes clicks target pay-per-click ads, boosting webpage search rankings or artificially inflating the popularity of a post. Click bots are often responsible for click fraud. What is click…
A bot is a software program that operates on the Internet and performs repetitive tasks. While some bot traffic is from good bots, bad bots can negatively impact a website…
Personal information is any information that can identify a person, from someone’s name and address to their device identifier and account number. What is personal information or personal data? Personal…
Data privacy is the protection of personal data from those who should not have access to it and the ability of individuals to determine who can access their personal information.…