Cloud Security

Cloud Security

CDNetworks Defended a Browser Game Platform Against Massive 1.24 Tbps DDoS Attack

CDNetworks successfully mitigated a massive-scale DDoS attack targeting a browser game platform with a large user base in Southeast Asia.

Read More »
Cloud Security

What's New for CDNetworks' Cloud Security 2.0 & Why You Need It?

Let's interpret how CDNetworks Cloud Security 2.0 operates in real-world attack and defense scenarios from an enterprise perspective.

Read More »
Cloud Security

Practical Application of TLS Fingerprinting in Bot Mitigation

In today’s digital world, cybersecurity has become a crucial issue for individuals, organizations, and even nations.

Read More »
Cloud Security

A Brief Discussion on the Application of rDNS in IP Intelligence Development

Contrary to DNS, rDNS is the process of converting an IP address into a domain name, achieved by querying PTR and CNAME records.

Read More »
Cloud Security

Bricks Builder WordPress Theme: Critical Remote Code Execution Vulnerability (CVE-2024-25600)

Discover the critical remote code execution vulnerability in the WordPress Bricks Builder theme. Learn how to update and protect your site from unauthorized access.

Read More »
Cloud Security

The Rise of LockBit: Dominating Global Ransomware Threats

Explore the evolution of LockBit ransomware, responsible for 27.93% of attacks. Learn how risk management, WAAP, and zero trust can bolster your cybersecurity defenses.

Read More »
Cloud Security

WordPress Backup Migration Plugin Vulnerability (CVE-2023-6553)

Discover the latest vulnerability in the Backup Migration WordPress plugin, affecting site security. Learn more about the issue and how to protect your website.

Read More »
Cloud Security

Comprehensive API Security: Managing and Protecting API Assets with CDNetworks API Shield

Discover how CDNetworks API Shield enhances API security by automating asset management, consolidating endpoints, and protecting sensitive data efficiently.

Read More »
Cloud Security

How Do DDoS Attacks Work?

Discover how DDoS attacks work through flooding targets with malicious traffic how CDNetworks' infrastructure defends against these threats.

Read More »

no data

Sorry, we did not find the information you are searching for.