
DDoS: Permanent Data Flood Without a Protection Strategy – And How to Protect Against It
DDoS: Permanent Data Flood Without a Protection Strategy – And How to Protect Against It
The Evolving Threat Landscape of Web Applications and IT Systems
The threat landscape surrounding web applications and IT systems is becoming increasingly sophisticated. While traditional attacks such as SQL injections, cross-site scripting, and session hijacking remain active in 2025, they have been significantly mitigated through modern web frameworks, web application firewalls (WAF), and adherence to best practices.
However, have you ever heard of attacks that don’t aim to steal or manipulate confidential data? There are also attacks that solely focus on taking IT systems offline for as long as possible and maximizing the damage to those affected.
In this article, we will examine one such malicious attack method, which reached a new dimension in 2013 with the traffic spikes on spamhaus.org. Five years later, GitHub experienced a DDoS attack with an astonishing data rate of 1.35 Tbps. These kinds of attacks are not isolated incidents – any company or organization could be affected tomorrow.
Sources
- Spamhaus History (accessed on 14.09.2024)
- GitHub DDoS Incident Report (accessed on 03.09.2024)