Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

DDoS Demystified: Understanding the Threat

24:38
 
Share
 

Manage episode 482954464 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Takeaways

  • #DDoS can mimic legitimate traffic, making detection difficult.
  • #Botnets are often created from compromised IoT devices.
  • Motivations for DDoS attacks range from hacktivism to personal grievances.
  • Residential IP proxy networks complicate DDoS defense.
  • #AI is increasingly being used in both attacks and defenses.
  • The future of cybersecurity will require AI-assisted solutions.
  • Organisations must understand their traffic to defend effectively.

Summary

In this episode of The Security Strategist podcast, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.

DDoS attacks are “one of the oldest cybersecurity attacks”. It’s an attempt to incapacitate a network, server, or website by overwhelming it with huge amounts of traffic.

However, despite their long history, DDoS attacks remain a significant problem. This is due to the fact that they “look like really popular, busy websites” which can lead to legitimate traffic being generated.

Warburton explains that they could be employed for a number of reasons, such as hacktivism, gaming-related conflicts, and geopolitical manipulation. A key example is of a Russian operation which used a digital attack to mimic a French protest against pension reform. This spread disinformation and created real world tension.

Tune into the latest episode to hear Warburton’s advice to businesses on tackling DDoS attacks.

For the latest tech insights visit: EM360Tech.com

  continue reading

159 episodes

Artwork
iconShare
 
Manage episode 482954464 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Takeaways

  • #DDoS can mimic legitimate traffic, making detection difficult.
  • #Botnets are often created from compromised IoT devices.
  • Motivations for DDoS attacks range from hacktivism to personal grievances.
  • Residential IP proxy networks complicate DDoS defense.
  • #AI is increasingly being used in both attacks and defenses.
  • The future of cybersecurity will require AI-assisted solutions.
  • Organisations must understand their traffic to defend effectively.

Summary

In this episode of The Security Strategist podcast, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.

DDoS attacks are “one of the oldest cybersecurity attacks”. It’s an attempt to incapacitate a network, server, or website by overwhelming it with huge amounts of traffic.

However, despite their long history, DDoS attacks remain a significant problem. This is due to the fact that they “look like really popular, busy websites” which can lead to legitimate traffic being generated.

Warburton explains that they could be employed for a number of reasons, such as hacktivism, gaming-related conflicts, and geopolitical manipulation. A key example is of a Russian operation which used a digital attack to mimic a French protest against pension reform. This spread disinformation and created real world tension.

Tune into the latest episode to hear Warburton’s advice to businesses on tackling DDoS attacks.

For the latest tech insights visit: EM360Tech.com

  continue reading

159 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play