• |

A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

August 12, 2020

Strengthening DNS Security with DNS over HTTPS (DoH)

The Domain Name System (DNS) is critical to the functioning of the internet. The protocol was created more than 30 years ago to replace the process of manually updating lists of servers (IP addresses) on the internet/Arpanet. DNS has become increasingly vulnerable to a host of malicious attacks on networks and subscribers. Over the years, the industry has responded to these growing concerns with several security enhancements — the most recently proposed standard is DNS over HTTPS (DoH). What is the Domain Name System and How Does it Work? Think of DNS as an address book that translates the IP Read more

August 11, 2020

Ransomware Attacks and the Evolution of Data Exfiltration

Ransomware is one of the most sophisticated and feared attacks in the modern threat landscape. A specialized form of malware, ransomware is designed to forcibly encrypt a victim’s files. The attacker then demands a payment from the victim in exchange for the decryption key to restore access to the data upon payment. Costs can range from a few hundred dollars to millions, in addition to the disruption suffered while data remained inaccessible. And even if the ransom is paid, there’s no guarantee that the promised key will be provided. The ability of a ransomware attack to render its victim’s data Read more

August 10, 2020

When the Internet of Things (IoT) is Armed as an IoT Botnet

Don’t Join the IoT Botnet Army When the Internet of Things (IoT) is weaponized to launch DDoS attacks, it’s called the DDoS of Things. The problem is that many consumer IoT devices can easily be hijacked and made part of such IoT botnets, which are then used to power bigger, smarter, and more devastating multi-vector DDoS attacks than ever before. We can clearly see that DDoS attacks have become more common, rising in direct proportion to the increase in the number of IoT devices. One might ask how many IoT devices are connected to the internet. In 2017, Gartner forecast Read more

August 6, 2020

Threat Intelligence Report: DDoS Attacks Intensify in Q2 2020

DDoS attacks continue to grow in size, frequency and sophistication. DDoS botnet weapons remain as popular as ever, while modern malware is gaining new ways to infect IoT systems and recruit them as drones. Reflected amplification attacks are helping hackers intensify the impact of their efforts. In challenging times like these, for enterprise security professionals, up-to-date threat intelligence is a critically important part of a DDoS protection strategy to protect vital systems. “Q2 2020: The State of DDoS Weapons,” threat intelligence report by A10 Networks security researchers, provides a detailed look at the weapons, methods, and geographies defining the current Read more

August 3, 2020

Key differences Between TLS 1.2 and TLS 1.3

Transport Layer Security (TLS) is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS (Hyper Text Transfer Protocol Secure). When a user visits a website, their browser checks for a TLS certificate on the site. If one is present, their browser performs a TLS handshake to check its validity and authenticate the server. Once a link has been established between the two servers, TLS encryption and SSL decryption enable secure data transport Since its initial definition Read more

July 29, 2020

Defeat Emotet Malware with SSL Interception – No Mask Needed

The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs. Taking advantage of a weakness in the way Emotet malware components were stored, white-hat hackers donned their vigilante masks and sabotaged the operations of the recently revived cyberthreat. While highly effective as well as somewhat humorous, the incident shouldn’t distract attention from two unavoidable truths. First, while the prank deactivated about a quarter of all Emotet malware payload downloads, the botnet remains a very real, ongoing threat and a prime vector for attacks such as ransomware. And second, Read more

July 27, 2020

Five Most Famous DDoS Attacks and Then Some

Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational conglomerate, your online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. Moreover, DDoS attacks are sometimes used to distract your cybersecurity operations while other criminal activity, such as data theft or network infiltration, is underway. DDoS Attacks Getting Bigger, More Frequent The first known Distributed Denial of Service attack occurred in 1996 when Panix, now one of the oldest internet service providers, was knocked offline for several days by a SYN flood, a Read more

July 21, 2020

A10 Launches Virtual Executive Briefing Center Experience

Global Pandemic Requires Creative Approaches to Providing EBC Experiences for Customers and Prospects The COVID-19 pandemic has not only caused businesses to completely rethink the infrastructure that supports their employees and customers, it is causing a shift in how companies engage with their customers and prospects. Across many industries, including restaurants, service delivery businesses, service providers and enterprises alike, are retooling how they do business in order to meet the health, safety and remote work requirements for this moment in time. Since the pandemic shut down domestic and international travel in early March, A10 has also undergone such a transformation, Read more

5G

July 15, 2020

Mobile Operators Move Rapidly Toward 5G Deployments

The first phase of 5G build-out is now well underway in major markets around the world. Increasingly, the big mobile service providers and some new entrants, as well, are in the midst of their first 5G deployments or will begin them this year. Mobile operators say their industry has made rapid progress toward 5G deployment over the past 12 months, especially in major markets. And while the initial implementations are non-standalone 5G, which takes advantage of existing 4G core networks, fully virtualized/cloud-native or standalone 5G is already on the drawing board. Meanwhile, cybersecurity remains one of the primary concerns of Read more

July 14, 2020

What is a DDoS Attack (Distributed Denial of Service Attack)?

DDoS Attack Definition A Distributed Denial of Service attack, otherwise called a DDoS attack, is an assault on an online service that is, unfortunately, remarkably easy to mount and, if your cybersecurity team doesn’t have effective DDoS protection tools, these attacks are hard to counter. DDoS attacks are, at least in concept, simple: By sending specially crafted requests from a network of compromised devices controlled by hackers (called a “botnet”), the target device (for example, a web server) becomes overwhelmed and connections from normal traffic get slowed down or even excluded while the computing resources of the target (processor cycles, Read more

5G

July 13, 2020

5G Deployment and Edge Computing Monetization Strategies

The May 2020 edition of RCR Wireless News provides a comprehensive overview of the role edge computing will play in accelerating the digital transformation enabled by the rollout of 5G deployments. While typically heralded for its speed and responsiveness, 5G alone cannot drive the revenue-generating services and applications that telcos need to justify their investments in 5G technologies. A successful 5G strategy for service providers needs to incorporate complementary technologies to offer the kind of innovative, real-time services that can also deliver real revenue opportunities. The optimal way to capitalize on the ultra-low latency response times 5G promises is to Read more