This website uses cookies in order to improve its ease of use. You accept this by continuing to use of the website. You can find more information on cookies and their deactivation here.

07/18/2018        Security-Blog
Infographic: Unlimited Growth

With 14,736 attacks in the first quarter of 2018 alone, the Link11 Security Operation Center (LSOC) again sees a significant increase of DDoS attacks compared to the previous year. The risk for organizations to become victims of a DDoS attack thus continues.

Read More
06/21/2018        Security-Blog
Infographic: 10 Reasons Why Cyber Security should be Top Priority for Organizations in 2018

Year by year, the risk for organizations to become a victim of a cyberattack is increasing. The cost of cyber security will amount to $6 trillion by 2021. However, the consequences are not just financial damage. 55% of organizations cooperate with external partners in order to be protected against cybercrime. The following infographic contains 10 significant reasons why cyber security should be top priority for organizations in 2018.

Read More
04/11/2018        Security-Blog
What are DNS Amplification Attacks

DNS amplification attacks are a version of distributed denial-of-service attacks (also known as DDoS). These DNS amplification attacks use DNS servers as amplifiers. According to the Shadowserver Foundation, there are more than 3,5 million DNS servers on the planet.

Read More
03/21/2018        Security-Blog
Game Over: DDoS Attacks on Esports

Digital gaming is booming. Once a personal hobby confined to people’s homes, online gaming is now a professional sport that attracts stadium audiences, like track and field events. Should they go down due to DDoS attacks, it may lead to financial or organizational issues, or even to the rescheduling of entire events.

Read More
03/20/2018        Security-Blog
Student Makes X4U Doser DDoS Tool Available

Just like PDF tools or programs for blocking online ads, tools for running DDoS attacks can be simply downloaded from the internet, free of charge. One of these programs is called X4U Doser. It enables anyone to launch DDoS attacks on targets of their choosing, even without any in-depth technical knowledge.

Read More
03/14/2018        Security-Blog
IT Security: The Many Risks Involved in the Internet of Things

IoT devices and industrial machinery are increasingly targeted by professional cyber-attacks, especially DDoS attacks. Preventing this kind of attack is the companies’ responsibility.

Read More
03/08/2018        Security-Blog
SSL DDoS Attacks and How to Defend Against Them

The relevance of SSL encryption is on the rise, making online shopping and banking more secure. Today, more than 70 % of global website traffic is HTTPS-encrypted. The increase of SSL encryption accompanies the rising number of SSL DDoS attacks.

Read More
02/27/2018        Security-Blog
New High-Volume Vector: Memcached Reflection Amplification Attacks

In late February 2018, the Link11 Security Operation Center discovered massive UDP attacks using UDP source port 11211. This type of attack was previously unknown. These current attacks thus represent the appearance of a new amplification vector, which the Link11 DDoS security experts call "Memcached Reflection" after initial analysis.

Read More
02/14/2018        Security-Blog
IP fragmentation attacks – how do they work?

To understand IP fragmentation attacks, it is important to understand IP fragmentation first. IP communication is used to exchange data packets on the internet. Between their source and their target, the packets often have to be passed along by various connection technologies and systems.

Read More
02/08/2018        Security-Blog
Deep inside CHARGEN flood attacks

The CHARGEN protocol, also known as the Character Generator Protocol, is a network service defined in 1983. Its specifications are laid out in RFC 864. CHARGEN was developed to simplify testing, troubleshooting and evaluating networks and applications. The Character Generator Protocol is based on the simple idea of providing a service that can be accessed both by TCP and UDP protocol (via port 19).

Read More

Page 3 from 4


Stay up to date!

Subscribe to the Link11 blog about the company, it security, and cybercrime.


Follow Link11 on Twitter