Can Load balancing help against DDoS attacks?

The Load balancing is a critical component for preventing DDoS attacks. Why? We will take a detailed look at that a bit later in this article. Let’s start.

What does Load balancing mean?

Load balancing in DNS is a way of dispersing client requests among server machines using domain configuration. The domain can be linked to a website, email system, or any other Internet-based service.

If you operate a large and popular website, you may expect a lot of requests for it. It must also be speedy, give up-to-date information, and accurately and rapidly handle the requests it receives. This is where the concept of traffic balancing comes into play.

Continue reading “Can Load balancing help against DDoS attacks?”

​How to protect against DNS poisoning?

Here you will see working solutions against DNS poisoning attacks. Apply these steps and protect your business from the harmful effects they could have on it. 

​What is DNS poisoning?

DNS poisoning or DNS spoofing is a type of attack in which the bad actors manipulate the DNS traffic, usually by infecting the DNS cache and directing this traffic towards a fake website they control. The idea is that the visitors won’t know they are redirected to a site that bad actors manage because it will look just like the real site. There they can leave their private data that the criminals can use in the future.

Continue reading “​How to protect against DNS poisoning?”

What is a DDoS amplification attack?

A distributed denial of service or DDoS is one of the most dangerous cyber threats that online businesses face daily. The amplification can be explained with simple words: increase, intensification, magnification, etc. The dimension such type of attack can reach is scary, don’t you think so?

What is a DDoS amplification attack?

A DDoS amplification attack is a volumetric and reflection-based cyber attack. It occurs when perpetrators take advantage of the public recursive DNS servers to overwhelm a network, website, application, online service, or a server with an amplified traffic amount. This drives the victim to an inaccessible status (denial of service). 

DDoS amplification attacks by Memcached

Continue reading “What is a DDoS amplification attack?”

How to detect a Man-in-the-middle attack?

What is a Man-in-the-middle attack?

Man-in-the-Middle (or MITM) attack redirects user connection and private data from a trusted participant to an illegitimate third-party source. The most common targets of such attacks are:

  • E-commerce websites
  • Bank websites
  • SaaS companies

The attacker aims to redirect a user from a genuine website to a fraudulent website. They build it in such a way as to convince the victim to enter personal or login information. In recent years, the attackers evolved in creating convincing fake websites and quite well match the original website. That means users with more experience are also falling into the trap of MITM attacks. For instance, the victim thinks it is logging into their bank account or buying a product. But actually, the user is giving sensitive data to the criminal. Therefore, being watchful and careful is absolutely necessary.

Continue reading “How to detect a Man-in-the-middle attack?”