current

Evolving DDoS Attacks

Distributed denial of service (DDoS) attacks are evolving, with a shift towards more stealthy application-layer attacks and the emergence of new threats like loop attacks.

Detailed Analysis

DDoS attacks continue to pose a significant threat, with attackers adapting their techniques to bypass traditional defenses. The rise of application-layer attacks, which are more difficult to mitigate than network-level attacks, is a growing concern. The emergence of new threats like loop attacks, which exploit vulnerabilities in application-layer protocols, further complicates the DDoS landscape. Organizations must implement a defense-in-depth strategy to protect against the evolving DDoS threat.

Context Signals

Fourfold increase in DDoS attacks mitigated in the second half of the year. Loop attacks can cause significant disruption by ensnaring multiple servers in a never-ending communication loop.

Edge

Application-layer attacks may become the dominant form of DDoS, requiring more sophisticated mitigation techniques. The exploitation of vulnerabilities in core internet protocols could lead to large-scale disruptions of online services.
Click to access the source report
Tune in
to all the
TRENDS
A new type of cyberattack is targeting the very protocols that form the backbone of our internet communication. Dubbed the “loop attack,” this vulnerability reveals a critical weakness in application-layer protocols that rely on the User Datagram Protocol (UDP).