Home Resources Blog Summer 2018 State of the Internet / Security: Web Attack Report

Summer 2018 State of the Internet / Security: Web Attack Report

Admin Globaldots
02.07.2018
image 1 Min read

It’s that time of year – the Summer 2018 State of the Internet / Security: Web Attack report is now live. This new naming schema is just one of the many changes you’ll notice if you’re a returning reader of quarterly report, and there are more changes coming as we work to bring you insights and intelligence from our data in as useful and timely a way as possible.

The Web Attack report is evolving into a shorter, leaner report. The Attack Spotlight was released as a stand alone paper. The statistical plots that made up a large part of the report have been published as blog posts (Web Attacks & DDoS By The Numbers). These changes will allow us to publish statistical data in a more timely manner in the future. At the same time, we are moving to more focused reports, published biannually, instead of a larger report published quarterly.

Here are some key takeaways from this new report:

– 16% increase in total DDoS attacks in Summer 2018 vs Summer 2017

– New attack vector: Memcached reflection

– New record DDoS attack: 1.35 Tbps

– 7,822 mitigated DDoS attacks

– Multi-vector reflection attacks using obscure vectors (IPMI and IKE) Mirai attacks still ongoing with new variants

Image Source

Read more: Akamai blog

Learn More

Streamline Your Alert Management with Groupings
Monitoring, Logging & Observability
Admin Globaldots 02.02.23

Alerting is crucial for avoiding outages, not just responding to them. That’s why GlobalDots is adopting an innovation that revolutionizes the way alerts are processed, enabling teams to achieve their goals proactively and resolve issues quickly. Handling alerts on a large scale can be difficult, especially when dealing with hundreds or even thousands of alerts. […]

Read more
You’ll Need Zero Trust, But You Won’t Get It with a VPN
SD-WAN and SASE
Admin Globaldots 12.01.23

Properly implemented, a zero trust architecture provides much more granular and effective security than legacy security models. However, this is only true if a zero trust initiative is supported with the right tools. Legacy solutions, such as virtual private networks (VPNs), lack the capabilities necessary to implement a zero trust security strategy. Zero Trust Security is […]

Read more
4 Ways Where Remote Access VPNs Fall Short
SD-WAN and SASE
Admin Globaldots 09.01.23

The Global Content Delivery Network (CDN) market is expected to grow by $42.4 billion between now and 2032.

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo