Telco Transformation: enable you to deploy and offer DDoS mitigation-as-a-service at a low capex and a low opex.
Read more
MX7000: A powerful, versatile 'cloud-in-a-box' DDoS mitigation solution.
Learn more
TAP the lucrative market for DDoS Protection.
Be Our Partner
The Capture The Flag challenge: Get on the top of the scoreboard and win an Pentester Expert Coin !
Enroll now
According to the Q3 2020 DDoS Threat Report, 77% of cyberattacks were targeted at online gaming companies, and attacks witnessed were largely volumetric and single vector attacks.
Download the report
Cybersecurity best practices and DDoS defence strategies
A vulnerability known as “SegmentSmack” was recently discovered in Linux kernels of versions 4.9 or later. An attacker can exploit this vulnerability by remotely sending specially crafted TCP packets to prompt resource-intensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() via open ports, causing CPU saturation and ultimately achieving a denial-of-service (DoS) effect.
It is confirmed that all Nexusguard services are not affected by the vulnerability. We are also working with our vendors on the patching of a few non-critical systems they supply. We recommend customers running affected Linux kernels to apply the patches from the following links:
https://lkml.org/lkml/2018/7/28/40 (Linux 4.9.116)
https://lkml.org/lkml/2018/7/28/44 (Linux 4.17.11)
Thank You!
We will get back to you shortly.
A vulnerability known as “SegmentSmack” was recently discovered in Linux kernels of versions 4.9 or later. An attacker can exploit this vulnerability by remotely sending specially crafted TCP packets to prompt resource-intensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() via open ports, causing CPU saturation and ultimately achieving a denial-of-service (DoS) effect.
© Copyright 2021. Nexuguard Limited.
All Rights Reserved. Read Our Privacy Policy.