• |

A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

August 3, 2020

Key differences Between TLS 1.2 and TLS 1.3

Transport Layer Security (TLS) is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS (Hyper Text Transfer Protocol Secure). When a user visits a website, their browser checks for a TLS certificate on the site. If one is present, their browser performs a TLS handshake to check its validity and authenticate the server. Once a link has been established between the two servers, TLS encryption and SSL decryption enable secure data transport Since its initial definition Read more

July 29, 2020

Defeat Emotet Malware with SSL Interception – No Mask Needed

The Emotet trojan recently turned from a major cybersecurity threat to a laughingstock when its payloads were replaced by harmless animated GIFs. Taking advantage of a weakness in the way Emotet malware components were stored, white-hat hackers donned their vigilante masks and sabotaged the operations of the recently revived cyberthreat. While highly effective as well as somewhat humorous, the incident shouldn’t distract attention from two unavoidable truths. First, while the prank deactivated about a quarter of all Emotet malware payload downloads, the botnet remains a very real, ongoing threat and a prime vector for attacks such as ransomware. And second, Read more

July 27, 2020

Five Most Famous DDoS Attacks and Then Some

Distributed Denial of Service (DDoS) attacks are now everyday occurrences. Whether you’re a small non-profit or a huge multinational conglomerate, your online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. Moreover, DDoS attacks are sometimes used to distract your cybersecurity operations while other criminal activity, such as data theft or network infiltration, is underway. DDoS Attacks Getting Bigger, More Frequent The first known Distributed Denial of Service attack occurred in 1996 when Panix, now one of the oldest internet service providers, was knocked offline for several days by a SYN flood, a Read more

July 21, 2020

A10 Launches Virtual Executive Briefing Center Experience

Global Pandemic Requires Creative Approaches to Providing EBC Experiences for Customers and Prospects The COVID-19 pandemic has not only caused businesses to completely rethink the infrastructure that supports their employees and customers, it is causing a shift in how companies engage with their customers and prospects. Across many industries, including restaurants, service delivery businesses, service providers and enterprises alike, are retooling how they do business in order to meet the health, safety and remote work requirements for this moment in time. Since the pandemic shut down domestic and international travel in early March, A10 has also undergone such a transformation, Read more

5G

July 15, 2020

Mobile Operators Move Rapidly Toward 5G Deployments

The first phase of 5G build-out is now well underway in major markets around the world. Increasingly, the big mobile service providers and some new entrants, as well, are in the midst of their first 5G deployments or will begin them this year. Mobile operators say their industry has made rapid progress toward 5G deployment over the past 12 months, especially in major markets. And while the initial implementations are non-standalone 5G, which takes advantage of existing 4G core networks, fully virtualized/cloud-native or standalone 5G is already on the drawing board. Meanwhile, cybersecurity remains one of the primary concerns of Read more

July 14, 2020

What is a DDoS Attack (Distributed Denial of Service Attack)?

DDoS Attack Definition A Distributed Denial of Service attack, otherwise called a DDoS attack, is an assault on an online service that is, unfortunately, remarkably easy to mount and, if your cybersecurity team doesn’t have effective DDoS protection tools, these attacks are hard to counter. DDoS attacks are, at least in concept, simple: By sending specially crafted requests from a network of compromised devices controlled by hackers (called a “botnet”), the target device (for example, a web server) becomes overwhelmed and connections from normal traffic get slowed down or even excluded while the computing resources of the target (processor cycles, Read more

5G

July 13, 2020

5G Deployment and Edge Computing Monetization Strategies

The May 2020 edition of RCR Wireless News provides a comprehensive overview of the role edge computing will play in accelerating the digital transformation enabled by the rollout of 5G deployments. While typically heralded for its speed and responsiveness, 5G alone cannot drive the revenue-generating services and applications that telcos need to justify their investments in 5G technologies. A successful 5G strategy for service providers needs to incorporate complementary technologies to offer the kind of innovative, real-time services that can also deliver real revenue opportunities. The optimal way to capitalize on the ultra-low latency response times 5G promises is to Read more

July 10, 2020

What is Global Server Load Balancing (GSLB)?

For companies to deliver the best possible experience to users, they need to ensure always-on connectivity and reliable performance for business applications whenever and wherever they’re accessed. Global server load balancing (GSLB) helps you meet this requirement by providing load balancing, site failover, and web traffic management across multiple data centers and/or clouds. A core feature of a modern application delivery controller (ADC), GSLB plays a key role in use cases from disaster recovery, to application performance and availability, to regulatory compliance. As its name suggests, GSLB balances network traffic across an organization’s data centers. As client traffic accesses the Read more

5G

July 8, 2020

Deployment Challenges in Multi-access Edge Computing (MEC)

The edge is getting crowded, and mobile operators, cloud providers and enterprises are staking a position to determine who will benefit from edge computing and capture revenues from new services. Amazon, Google, Microsoft, AT&T have already announced major edge strategies that include infrastructure for mobile edge computing that will complement or compete with operators for new low-latency 5G services. IDC has estimated that by 2023, more than half of all worldwide GDP is predicted to be driven by products and services from digitally transformed industries. For organizations to stay competitive in this digital-first economy, services must be able to run Read more

July 8, 2020

NXNSAttack: A New DDoS Attack on Recursive DNS Resolvers

The purpose of a Distributed Denial of Service or DDoS attack is to prevent an online service from working properly by overloading a target service, say a web server, such that valid users either experience poor performance or, taken to the extreme, can’t connect to the target service at all. Whatever the degree of a cyberattack, the consequences are loss of service and loss of revenue which is particularly problematic for ecommerce sites so having DDoS protection in place before your organization suffers a cyberattack is crucial for ensuring business continuity and minimizing risk. But the worst thing about DDoS Read more

July 6, 2020

What’s so bad about the NXNSAttack DNS Amplification Attack?

How did NXNSAttack Against DNS Services get Noticed? In May 2020, the NXNSAttack was identified as a new DDoS attack on DNS servers by the cybersecurity researchers at Tel Aviv University. The NXNSAttack exploits the vulnerability at recursive DNS resolvers and triggers an amplification attack to other recursive DNS servers and authoritative DNS servers by up to 1,620 times the original resolution request. Such a high amplification factor should concern DNS infrastructure owners and DNS server managers. How does NXNSAttack Impact DNS Services? In a typical recursive DNS name resolution process, the authoritative DNS server could return an IP address Read more