New Amplification Vector Datagram Transport Layer Security (DTLS) targets Citrix ADC systems.
Read MoreBlackmail by anonymous cybercriminals is an acute threat to companies of all sizes. Hackers also target administrations and government authorities. Only a comprehensive approach to IT security can offer reliable protection against the pervasive danger posed by ransomware.
Read MoreThe first six months of 2020 underlined the fact that the consequences of DDoS attacks are no longer solely limited to companies that are attacked. Our timeline highlights incidents where the damage was particularly severe.
Read MoreLink11 is cautioning hosting providers to beware of a new wave of DDoS blackmail attacks by the Armada Collective. As recently as mid-August, attackers using the name Fancy Bear used DDoS attacks to put pressure on operators of critical infrastructure and financial services.
Read MoreFancy Bear extortion emails demand Bitcoin transfers and threaten lengthy, high-volume attacks over 2,000 Gbps, with critical infrastructure providers targeted most
Read MoreAttacks in April, May and June 2020 more than double compared with Q2 2019, and attacks using public cloud infrastructure increase
Read MoreThe first reflection amplification vectors occurred in 2013 and involved DNS and NTP. Since then, the spectrum of vectors has become far greater. Currently, there are over 20 techniques.
Read MoreDDoS flooding attacks against big name brands have made media headlines for more than two decades. However, many bot attacks aren’t flooding attacks at all. These attacks pose a huge threat to organizations and website owners… but few are aware of the risks.
Read MoreIn 2019, we could clearly see that various countries, as well as organizations across different industries and of all sizes, were hit by DDoS attacks. Attackers managed to find a way to take down the IT systems of organizations that were not vigilant enough. This infographic provides a quick summary of some of the most notable DDoS attacks that occurred over the past 12 months.
Read MoreFollow Link11 on Twitter
How to protect your business and website from DDoS attacks during the biggest sales period of the year:…
5 Retweets 6
Read MoreWhat are DDoS Attacks and how do cybercriminals use them as weapons to shut down IT infrastructures? And more impor…
7 Retweets 5
Read MoreThis is why (and how) you should block bots on your business website (includes a list of most common bot attacks):…
13 Retweets 9
Read MoreWhat is Web Application Firewall, why do you need it and how does it protect your company? Learn more by reading ou…
3 Retweets 5
Read More@RandyLoss Hah, you weren't the only one saying that.
0 Retweets 0
@vxtrade Your company might ;)
0 Retweets 1
@deckhand25 He is not, but close enough! ;)
0 Retweets 1
What would you do if you received a 180 000€ DDoS extortion email warning to exceed your web infrastructure defense…
1 Retweets 4
Read MoreGet a detailed and up to date overview of the global DDoS threat landscape by taking a look at our DDoS Report from…
6 Retweets 5
Read MoreRT @cloudtweeters: #CyberResilience has been redefined! We've partnered with @Link11GmbH so our VARs can provide customers with intelligen…
3 Retweets 0
@SecurityParalok Link11 DDoS Protection can help!
0 Retweets 0
@QAValley Thank you for sharing, great piece. For the fastest and reliable German made DDoS Protection, get in touch!
0 Retweets 0