Cyber Security Archives | A10 Networks
  • |

A10 Blog

/

Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

July 8, 2020

NXNSAttack: A New DDoS Attack on Recursive DNS Resolvers

The purpose of a Distributed Denial of Service or DDoS attack is to prevent an online service from working properly by overloading a target service, say a web server, such that valid users either experience poor performance or, taken to the extreme, can’t connect to the target service at all. Whatever the degree of a…

July 6, 2020

What's so bad about the NXNSAttack DNS Amplification Attack?

How did NXNSAttack Against DNS Services get Noticed? In May 2020, the NXNSAttack was identified as a new DDoS attack on DNS servers by the cybersecurity researchers at Tel Aviv University. The NXNSAttack exploits the vulnerability at recursive DNS resolvers and triggers an amplification attack to other recursive DNS servers and authoritative DNS servers by…

June 24, 2020

AWS hit by Largest Reported DDoS Attack of 2.3 Tbps

Attack Shows it is Imperative for a DDoS Zero-Trust Approach and Continued Diligence We have reached another milestone with the largest Distributed Denial of Service (DDoS) attack on record being reported by Amazon Web Services (AWS) at 2.3 Tbps in Q1 2020. This surpasses the last record attack by a whopping 70 percent. The previous…

June 11, 2020

TLS Inspection and Zero Trust Security

Protecting users against modern, invisible cyber threats A security strategy is only as strong as its weakest point. No matter how extensive your network defenses are, if there is even one blind spot, you are still vulnerable to attacks. This is true even for Zero Trust, the model at the core of modern cybersecurity. Fortunately,…

June 3, 2020

Delivering DDoS Protection, HTTP/3 and QUIC Protocol Protection

A10 Networks’ Thunder TPS Provides 1.2 Tbps Blocking Capacity with Machine Learning Fueled by massive IoT botnets and new reflected amplification exploits, Distributed Denial of Service (DDoS) attacks continue to grow in size and sophistication and have broken the 1 Tbps barrier. The Covid-19 pandemic has only increased the threat as cyber attackers find new…

April 1, 2020

How to Prevent Cyber Attacks During the COVID-19 Pandemic

COVID-19 Brings New Cyber Threats and Cyber Attacks Unless you were on a long desert meditation trip like Jared Leto, it is impossible not to have heard about the Coronavirus or COVID-19 (Coronavirus Disease) pandemic sweeping through the globe. At the time of writing this blog, there have been over half a million confirmed cases…

March 25, 2020

Curing Healthcare Cyber Security - A Better Way To Protect Patient Data

The Hippocratic Oath commands doctors to “first, do no harm.” Healthcare professionals have a proud tradition of honoring this commitment to their patients—but in today’s data-centric world, they face an equal obligation to secure the Protected Health Information (PHI), Personally Identifiable Information (PII), and financial data of their patients as well. And ironically, one of…

March 19, 2020

Security in a Multicloud Environment

Vigilance and Responsibility Required for Multicloud Secure Application Delivery As companies leverage a multicloud strategy to improve IT operations and provide better services to their customers, they can’t afford to overlook the implications for security. This is especially true with the emergence of a new paradigm to run multiple disparate compute environments for application delivery.…