Blog


30
Jan
IPv6 Adoption And Its Security

We are on the verge of an explosion in the number of Internet-connected devices, from security cameras to connected refrigerators, furniture and thermostats. Some experts predict that there’ll be as many as 200 billion connected devices around the world by 2020, or about 25 devices per person. And many of …

30
Jan
HaltDos- WAF
Posted ByKanishk Category Cyber SecurityWAF 1Comments

Cyber-criminals are targeting web applications from all around the world in their most upstream form, costing businesses and organizations a hell lot of money and a significant risk to their brand reputation. Recent cyber attacks on critical IT infrastructure demonstrates the urgent need for improved cybersecurity practices and measures. As …

31
Dec
Why Clean Pipe Is Not So Clean!
Posted ByKanishk Category Cyber SecurityDDoS

What is a Clean Pipe? A clean pipe is a type of DDoS mitigation solution for online businesses and websites that need real-time protection against volumetric DDoS attacks. The primary goal of the clean-pipe DDoS protection is to occlude network flood attack traffic before it enters an organization’s information network …

31
Dec
An insight into DNS based DDoS Attack

Introduction: The DNS stands for the Domain Name System. This system translates memorized domain names to the numerical IP addresses required for locating the website with the underlying network protocols. The DNS service is highly redundant and has a multi-layered architecture. There are two types of DNS servers: authoritative and recursive. Authoritative …