Protection

Understanding SYN flood attack

DDoS, Protection

Imagine a tech gremlin relentlessly hammering at the door of a server, bombarding it with so many requests that it can’t keep up and...

Read More

Botnet – what is it, and how does a Botnet attack work?

DDoS, Protection

Cybercriminals often use Botnet for their malicious purposes. That way, they build their army of devices and execute massive attacks. So...

Read More

DNS Tunneling attack – What is it, and how to protect ourselves?

DNS, Protection

DNS Tunneling attack turns the Domain Name System (DNS), a highly trusted and widely used system on the Internet, into a weapon for...

Read More

Whitelisting vs Blacklisting, preventing or reacting

Protection

There are different security methods out there, but when it comes to data filtering, there are two widely-used ones. You can use either...

Read More

DMARC, the solution for your phishing problems

Protection

DMARC emerges as the solution for phishing attacks that are a real danger for every business. They can severely damage the brand name, and...

Read More

Monitoring your DNS, should you do it?

DNS, Protection

DNS Monitoring can serve you and help you detect unwanted issues. As you probably know, the Internet would not function in such an easy and...

Read More
Close