Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Nexusguard Research

Nexusguard Research

Featured Stories

Posts by Nexusguard Research

CVE-2022-26134: Zero-Day ...

About the Vulnerability   On June 2, Volexity claimed that they had discovered unusual beh...

CSPs need to adopt smarte...

Since 2020, Nexusguard Research has recorded over 4 million DDoS attacks, with Communicati...

Attackers continue to der...

Ever since their discovery in July 2018, bit-and-piece attacks have gone from strength to ...

Could “QUIC” turn into th...

Today, we use the Internet for so many different activities that it has become a necessity...

Could “Bypass Attacks” be...

In the first six months of 2020, rather than the use of traditional tactics exploited by t...

COVID-19 pandemic causing...

In March and April, we recorded the most significant increase in DDoS attacks ever. Compar...

How Vietnam networks unwi...

While Vietnam’s internet penetration continues to grow with demand for faster connectivity...

DDoS Protection Vital for...

From popular multiplayer games to esports tournaments, the online/mobile gaming sector has...

Single targets, multiple ...

While the ongoing implementation of DNSSEC (Domain Name System Security Extensions) contin...

South Africa less than re...

As South Africa is the most connected country in Africa, South African organizations must ...

Who knows you better than...

Now more than ever your smartphone has replaced the PC as the most important smart connect...

Smart City Security and t...

The Internet of Things (IoT) has created new opportunities to address economic, social, an...

DNSSEC Fuels New Wave of ...

According to Nexusguard Research, DNS amplification attacks (8,382 counts) contributed to ...

What Is A DNS Attack And ...

What Is a DNS Attack? It is orchestrated by an attacker exploiting the vulnerabilities in ...

The Challenge of Data Sov...

The “cloudification” trend goes on and digital transformation is in full swing, and moving...

Nepal’s cybersecurity yet...

Nepal is a country of unity in diversity blessed with Himalayan beauty. But the rampancy o...

The devastating effects o...

While timing is of essence amid evolving political events, hitting the right targets can m...

The art of cyberwar: How ...

Whenever there are political tensions between the government of a nation and its citizens,...

Sting with HTML5 Ping

HTML5 Ping is a common HTML5 attribute, which was found to have been turned into a DDoS at...

Botnets go wireless

Botnets have traditionally sought to compromise desktop computers, but our latest findings...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.