Protection

5 DNS Attacks that could affect you

DDoS, DNS, Protection

The DNS, as you may know, is a really crucial component that, sadly, we often overlook. Don’t be one of those people, and please pay...

Read More

What is a Teardrop attack, and how to protect ourselves?

Internet, Protection, Servers

The Teardrop attack is a cyber threat that should not be neglected. It could affect you or your organization and crash your systems....

Read More

Botnet – what is it, and how does a Botnet attack work?

DDoS, Protection

Cybercriminals often use Botnet for their malicious purposes. That way, they build their army of devices and execute massive attacks. So...

Read More

DNS Tunneling attack – What is it, and how to protect ourselves?

DNS, Protection

DNS Tunneling attack turns the Domain Name System (DNS), a highly trusted and widely used system on the Internet, into a weapon for...

Read More

Whitelisting vs Blacklisting, preventing or reacting

Protection

There are different security methods out there, but when it comes to data filtering, there are two widely-used ones. You can use either...

Read More
Close