[Webinar]: How memcached reflection threatens IT security
2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and Aatish Pattni explain how to assess the threats.
Today's global IT infrastructures face a DDoS threat that has never existed before with such massive bandwidths. This issue relates to attack vectors, which can hit companies with a really destructive attack volume due to enormous amplification factors. The largest possible 'amplification reflection vector' to date has been detected in memcached reflection attacks. Cyber criminals can theoretically use the vector to increase their attacks by a factor of 50,000.
The terabit era has started
The new high-volume vector has achieved attack volumes that were previously impossible through reflected IoT attacks or amplified DNS and NTP reflection attacks. With the emergence of memcached reflection, the terabit level was quickly exceeded. Within a few days, memcached reflection set two new records for attack bandwidths with 1.3 Tbps and 1.7 Tbps.
Several months have passed since the first memcached reflection attack, but the all-clear cannot be given by any means. In fact, the Link11 Security Operation Center (LSOC) recorded a significant amount of memcached reflection activity in Q2 2018, as can be seen from the latest DDoS report from the IT security experts.
In the webinar, Kasten Desler and Aatish Pattni explain how to assess the current memcached threat situation and how companies can adequately protect themselves against high volume DDoS attacks.
- Link11 Memcached Webinar (@Link11)
Current articles
Stay updated on current DDoS reports, warnings, and news about IT security, cybercrime and DDoS protection.
Follow Link11 on Twitter
A simple visualization of how the Underground Cybercrime Economy cashes in on data and DDoS attacks. To learn more,…
9 Retweets 8
Read MoreHow to protect your business and website from DDoS attacks during the biggest sales period of the year:…
5 Retweets 6
Read MoreWhat are DDoS Attacks and how do cybercriminals use them as weapons to shut down IT infrastructures? And more impor…
7 Retweets 5
Read MoreThis is why (and how) you should block bots on your business website (includes a list of most common bot attacks):…
13 Retweets 9
Read MoreWhat is Web Application Firewall, why do you need it and how does it protect your company? Learn more by reading ou…
3 Retweets 5
Read More@RandyLoss Hah, you weren't the only one saying that.
0 Retweets 0
@vxtrade Your company might ;)
0 Retweets 1
@deckhand25 He is not, but close enough! ;)
0 Retweets 1
What would you do if you received a 180 000€ DDoS extortion email warning to exceed your web infrastructure defense…
1 Retweets 4
Read MoreGet a detailed and up to date overview of the global DDoS threat landscape by taking a look at our DDoS Report from…
6 Retweets 5
Read MoreRT @cloudtweeters: #CyberResilience has been redefined! We've partnered with @Link11GmbH so our VARs can provide customers with intelligen…
3 Retweets 0
@SecurityParalok Link11 DDoS Protection can help!
0 Retweets 0