Live webinar: 76% of Your API Traffic Is a Security Blind Spot : Here’s how to Fix It. May 13, 2026, 11:30 AM CEST | 03:00 PM IST.

Register Now →

DDoS attacks

7 articles

← All Articles
Top 10 Cybersecurity Threats WAFs Prevent

Top 10 Cybersecurity Threats WAFs Prevent

Discover the top 10 cybersecurity threats WAFs prevent, including SQL injection, XSS, DDoS, zero-day exploits, and more. Learn…

DDoS Attack Mitigation Playbook for SOC and DevOps Teams

DDoS Attack Mitigation Playbook for SOC and DevOps Teams

Facing DDoS threats? Arm your SOC & DevOps teams with effective mitigation strategies. Explore geo-fencing, IP blacklisting, and…

Under the hood of Behavioural DDOS Protection

Under the hood of Behavioural DDOS Protection

Blog Series 2 out of 2 In the last blog, we saw why static rate limits do not…

Introducing Fully Managed Behavioural Application DDOS Protection Solution.

Introducing Fully Managed Behavioural Application DDOS Protection Solution.

To accomplish complete DDoS protection, the best possible solution is a cloud WAF like AppTrana that has behavioral…

What is a DDoS Extortion Attack and How do you Respond to it?

What is a DDoS Extortion Attack and How do you Respond to it?

Cybercriminals are leveraging DDoS extortion attacks to extort money from organizations. Learn how to respond to these attacks.

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Indusface’s Customer – Victim of Application DDoS: Have you ever experienced a live DDoS attack on your website?…

OpenSSL MITM CCS vulnerability and its impact

OpenSSL MITM CCS vulnerability and its impact

Within weeks of the infamous Heartbleed vulnerability in one of the world’s most commonly used open-source software OpenSSL,…