• |

A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

September 15, 2020

Register now for the A10 Transcend Global User Conference

First Annual User Conference to Give Insights into Customers’ Digital Transformation Journeys Registration is now open for A10 Transcend, our first virtual user conference giving customers, partners and prospects a forum to share insights into their journey with digital and business transformation during and post COVID-19. Join us on November 9-10 for an impactful program. We are excited to announce our two celebrity guest speakers. Scott Kelly and Lindsey Vonn will share their inspirational stories of how they have transcended the odds in their respective journeys. In addition to these legendary speakers, we have a solid agenda of customer and Read more

5G

September 15, 2020

Ericsson Packet Core Firewall, Powered by A10 Networks, Meets Key Need for Cloud-native Security in 5G Networks

COVID-19 has heightened existing operator and public awareness and fears of network vulnerabilities. Cyber criminals have actively weaponized pandemic news and accelerated network attacks of all types, and mobile operators are scrambling to meet new traffic demands on 4G networks as they evolve the networks to 5G. Operators and their enterprise customers have voiced increased concerns about 5G security for some time. For example, in a recent survey conducted by the BPI Network[1] and A10 Networks, security is cited as a top requirement for 5G networks, nearly on a par with network reach and coverage and just ahead of capacity Read more

September 2, 2020

Dhrupad Trivedi Appointed as the Company’s Chairperson of the Board of Directors

We are pleased to report, that effective September 1, 2020, the Board of Directors of A10 Networks, Inc. (the “Company”) appointed Dhrupad Trivedi as the Company’s Chairperson of the Board of Directors and Eric Singer as the Lead Independent Director.

August 19, 2020

Load Balancing Goes to School to Learn Application Availability

Meeting the Challenges of K-12 Remote Learning Until recently, online technology was just one area of a larger set of teaching tools and methods. While 63 percent of K-12 educators used technology in the classroom daily, primarily laptops and computers, it was still entirely possible to give lessons with nothing more than a strong voice and an engaging manner. The shift to remote learning has transformed this picture toward the digitalization. Connectivity is no longer an option—it’s now the platform through which the entire school experience is going to be delivered for millions of students nationwide. This has made network Read more

August 12, 2020

Strengthening DNS Security with DNS over HTTPS (DoH)

The Domain Name System (DNS) is critical to the functioning of the internet. The protocol was created more than 30 years ago to replace the process of manually updating lists of servers (IP addresses) on the internet/Arpanet. DNS has become increasingly vulnerable to a host of malicious attacks on networks and subscribers. Over the years, the industry has responded to these growing concerns with several security enhancements — the most recently proposed standard is DNS over HTTPS (DoH). What is the Domain Name System and How Does it Work? Think of DNS as an address book that translates the IP Read more

August 11, 2020

Ransomware Attacks and the Evolution of Data Exfiltration

Ransomware is one of the most sophisticated and feared attacks in the modern threat landscape. A specialized form of malware, ransomware is designed to forcibly encrypt a victim’s files. The attacker then demands a payment from the victim in exchange for the decryption key to restore access to the data upon payment. Costs can range from a few hundred dollars to millions, in addition to the disruption suffered while data remained inaccessible. And even if the ransom is paid, there’s no guarantee that the promised key will be provided. The ability of a ransomware attack to render its victim’s data Read more

August 11, 2020

What is Carrier-grade NAT (CGN/CGNAT)?

Way back in the early days of the internet (the 1980s) every connected computer was intended to have its own unique public IP address. IP addressing was originally defined by four octets—four groups of eight bits, a standard called IPv4—which resulted in over four billion unique values (actually, 4,294,967,296), so at the time it seemed we’d never run out. IPv4 Exhaustion and Network Address Translation Fast forward to June 1992 and, as a result of the astounding growth of the internet, RFC 1338, Supernetting: an Address Assignment and Aggregation Strategy, was published. This memo was the first to discuss the Read more

August 10, 2020

When the Internet of Things (IoT) is Armed as an IoT Botnet

Don’t Join the IoT Botnet Army When the Internet of Things (IoT) is weaponized to launch DDoS attacks, it’s called the DDoS of Things. The problem is that many consumer IoT devices can easily be hijacked and made part of such IoT botnets, which are then used to power bigger, smarter, and more devastating multi-vector DDoS attacks than ever before. We can clearly see that DDoS attacks have become more common, rising in direct proportion to the increase in the number of IoT devices. One might ask how many IoT devices are connected to the internet. In 2017, Gartner forecast Read more

August 6, 2020

Threat Intelligence Report: DDoS Attacks Intensify in Q2 2020

DDoS attacks continue to grow in size, frequency and sophistication. DDoS botnet weapons remain as popular as ever, while modern malware is gaining new ways to infect IoT systems and recruit them as drones. Reflected amplification attacks are helping hackers intensify the impact of their efforts. In challenging times like these, for enterprise security professionals, up-to-date threat intelligence is a critically important part of a DDoS protection strategy to protect vital systems. “Q2 2020: The State of DDoS Weapons,” threat intelligence report by A10 Networks security researchers, provides a detailed look at the weapons, methods, and geographies defining the current Read more

August 3, 2020

Key differences Between TLS 1.2 and TLS 1.3

Transport Layer Security (TLS) is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS (Hyper Text Transfer Protocol Secure). When a user visits a website, their browser checks for a TLS certificate on the site. If one is present, their browser performs a TLS handshake to check its validity and authenticate the server. Once a link has been established between the two servers, TLS encryption and SSL decryption enable secure data transport Since its initial definition Read more

July 29, 2020

Defeat Emotet Malware with SSL Interception – No Mask Needed

The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs. Taking advantage of a weakness in the way Emotet malware components were stored, white-hat hackers donned their vigilante masks and sabotaged the operations of the recently revived cyberthreat. While highly effective as well as somewhat humorous, the incident shouldn’t distract attention from two unavoidable truths. First, while the prank deactivated about a quarter of all Emotet malware payload downloads, the botnet remains a very real, ongoing threat and a prime vector for attacks such as ransomware. And second, Read more