
Sign up to save your podcasts
Or


NETSCOUT recently announced findings from its DDoS Threat Intelligence Report. The findings demonstrate how sophisticated cybercriminals have become at bypassing defences with new DDoS attack vectors and successful methodologies.
"By constantly innovating and adapting, attackers are designing new, more effective DDoS attack vectors or doubling down on existing effective methodologies," said Richard Hummel, threat intelligence lead at NETSCOUT. "In the first half of 2022, attackers conducted more pre-attack reconnaissance, exercised a new attack vector called TP240 PhoneHome, created a tsunami of TCP flooding attacks, and rapidly expanded high-powered botnets to plague network-connected resources. In addition, bad actors have openly embraced online aggression with high-profile DDoS attack campaigns related to geopolitical unrest, which have had global implications."
NETSCOUT's Active Level Threat Analysis System (ATLAS™) compiles DDoS attack statistics from most of the world's ISPs, large data centres, and government and enterprise networks. This data represents intelligence on attacks occurring in over 190 countries, 550 industries, and 50,000 autonomous system numbers (ASNs). NETSCOUT's ATLAS Security Engineering and Response Team (ASERT) analyses and curates this data to provide unique insights in its biannual report.
When I hear phrases such as DNS water-torture attacks and carpet-bombing attacks on the rise combined with a new Netscout Threat Intelligence report, I immediately reached out to my go-to guy for cybersecurity threats. Richard Hummel rejoins me on Tech TAlks Daily to discuss the news in more detail and demystify some of the terminologies around the threat landscape.
By Neil C. Hughes5
198198 ratings
NETSCOUT recently announced findings from its DDoS Threat Intelligence Report. The findings demonstrate how sophisticated cybercriminals have become at bypassing defences with new DDoS attack vectors and successful methodologies.
"By constantly innovating and adapting, attackers are designing new, more effective DDoS attack vectors or doubling down on existing effective methodologies," said Richard Hummel, threat intelligence lead at NETSCOUT. "In the first half of 2022, attackers conducted more pre-attack reconnaissance, exercised a new attack vector called TP240 PhoneHome, created a tsunami of TCP flooding attacks, and rapidly expanded high-powered botnets to plague network-connected resources. In addition, bad actors have openly embraced online aggression with high-profile DDoS attack campaigns related to geopolitical unrest, which have had global implications."
NETSCOUT's Active Level Threat Analysis System (ATLAS™) compiles DDoS attack statistics from most of the world's ISPs, large data centres, and government and enterprise networks. This data represents intelligence on attacks occurring in over 190 countries, 550 industries, and 50,000 autonomous system numbers (ASNs). NETSCOUT's ATLAS Security Engineering and Response Team (ASERT) analyses and curates this data to provide unique insights in its biannual report.
When I hear phrases such as DNS water-torture attacks and carpet-bombing attacks on the rise combined with a new Netscout Threat Intelligence report, I immediately reached out to my go-to guy for cybersecurity threats. Richard Hummel rejoins me on Tech TAlks Daily to discuss the news in more detail and demystify some of the terminologies around the threat landscape.

1,285 Listeners

534 Listeners

1,641 Listeners

1,091 Listeners

156 Listeners

111 Listeners

301 Listeners

333 Listeners

267 Listeners

206 Listeners

9,942 Listeners

5,506 Listeners

349 Listeners

93 Listeners

617 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners