<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Nexusguard Blog

Cybersecurity best practices and DDoS defence strategies

Latest Stories

Featured Stories

New Cyber Attack Vector F...

A Joint Technical Alert (TA17-164A) entitled “HIDDEN COBRA – North Korea’s DDoS Botnet Inf...

DOS Attack Protection to ...

Overview Data Centre Cisco Switch were found to have unresolved vulnerabilities. This vuln...

Cybersecurity Risk Cautio...

  Internet of Things (IoT) is the target of “Mirai”, a botnet to launch cyberattack. Your ...

Greek Banks Extorted & Bo...

This week in DDoS Digest, we look at the following distributed denial of service stories:

Reporter Under Siege & Em...

Here are some key recent stories from distributed denial of service (DDoS) news:

Astronomical Growth & Biz...

This week as always, DDoS Digest provides nutshell summaries of the top stories in the wor...

CCTV Camera DDoS Botnet &...

Welcome to Nexusguard’s DDoS Digest: This Week’s Distributed Denial. We know that many peo...

1 in 3 DDoS Aren’t Simple...

Distributed Denial – Expensive and Increasingly Complex DDoS + Network Breach DDoS + Malwa...

DDoS Group Ramps Up Bank ...

The distributed denial of service attack group DD4BC is going after one financial institut...

UK Police & Lizard Squad ...

“The NCA website is being DDOS’d.” – Tweet from the National Crime Agency, September 1, 20...

DDoS Attack Hits 4Chan vi...

Malware uploaded to Imgur is Used in DDoS of 4Chan How Imgur was forced to turn against 4C...

DDOS Gaming Attacks on Ne...

Three DDoS attacks down games in September, derailing Star Trek gamers Why did these attac...

Pentagon to Build Rapid-F...

Pentagon Eyes New Security Tools to Counter Cyber-attacks Within Seconds XD3: The DDoS-Rea...

Mumsnet CEO Hit by Police...

A major website in the United Kingdom was hit with a distributed denial of service attack,...

DDOS Tools Used for Cyber...

DDoS attacks in Hong Kong In the last couple of weeks, Hong Kong has been under siege by a...

Torshammer: A Tool with S...

In our last blog post, we analyzed the attack tools used to launch DDoS attacks in Hong Ko...

Turning Web Servers into ...

Summary Full score. 10 out of 10.

SSDP Attack Prevention fo...

Summary SSDP (Simple Service Discovery Protocol) – commonly known as Universal Plug and Pl...

The Never-Ending Cup of C...

Another four years has passed and the world’s biggest football tournament has come again–o...

Are You Collateral Damage...

DDoS attacks are a serious concern. The consequences of an attack could lead to financial ...

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.

Comments Form: