Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

Protecting Your Network A...

In recent years, the rise of DDoS-for-hire attacks has emerged as one of the most concerni...

Uncovering a New Threat: ...

DDoS Protection for SASE ...

What is the Future of DDo...

What is the FFIEC DDoS Ma...

COVID-19 pandemic causing...

In March and April, we recorded the most significant increase in DDoS attacks ever. Compar...

How Vietnam networks unwi...

While Vietnam’s internet penetration continues to grow with demand for faster connectivity...

Communications Service Pr...

Communications service providers (CSPs) are suffering from an extremely stealthy network-l...

Mitigating TCP SYN floods

On the Nexusguard platform, you can configure protection from TCP SYN flood attacks. The m...

Single targets, multiple ...

While the ongoing implementation of DNSSEC (Domain Name System Security Extensions) contin...

South Africa less than re...

As South Africa is the most connected country in Africa, South African organizations must ...

DNSSEC Fuels New Wave of ...

According to Nexusguard Research, DNS amplification attacks (8,382 counts) contributed to ...

Nepal’s cybersecurity yet...

Nepal is a country of unity in diversity blessed with Himalayan beauty. But the rampancy o...

The devastating effects o...

While timing is of essence amid evolving political events, hitting the right targets can m...

The art of cyberwar: How ...

Whenever there are political tensions between the government of a nation and its citizens,...

Sting with HTML5 Ping

HTML5 Ping is a common HTML5 attribute, which was found to have been turned into a DDoS at...

Recent takedown of DDoS-f...

Last year, the FBI cracked down on the world’s 15 biggest DDoS-for-hire websites, known as...

New tricks with old metho...

Our latest research findings suggest that communications service providers (CSPs) continue...

Little droplets form roar...

Owing to their large attack surface, ASN-level CSPs are exposed most to the rising risk of...

Amplified DDoS Attack Imp...

Thanks to the fast growth of cloud computing, enterprises and even governmental department...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.