This site has commenting guidelines and comments are reviewed by moderators before they are fully published to the web site.
Subject of Your Post
Your Post
Protecting Performance from Traffic Spikes - Dark ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comment
Protecting Performance from Traffic Spikes
johnhsawyer
johnhsawyer,
User Rank: Moderator
10/29/2014 | 12:59:42 PM
Re: Protecting Performance from Traffic Spikes
@Kelly Jackson Higgins: People consider DDoS a nuisance rather than a major incident like a data breach, but it sounds like the rise in DDoS attacks could be due to the use of them as a diversion, correct?

It depends on the industry. Companies that rely on their websites' availability to make money see DDoS as much more than a nuisance. Unfortunately, the targets often think it's some petty issue that is causing them to be a target when it could be much more targeted. It's so easy to hire a DDoS service to hide what you're doing, I definitely think that more victims would realized they suffered another type of attack concurrently if they weren't so focused on stopping the DDoS attack and getting that money-making site back online.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-32033
PUBLISHED: 2022-07-01
Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the function formSetVirtualSer.
CVE-2022-32034
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the items parameter in the function formdelMasteraclist.
CVE-2022-32035
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formMasterMng.
CVE-2022-32036
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain multiple stack overflow vulnerabilities via the ssidList, storeName, and trademark parameters in the function formSetStoreWeb.
CVE-2022-32037
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formSetAPCfg.
This site has commenting guidelines and comments are reviewed by moderators before they are fully published to the web site.
Subject of Your Post
Your Post