top of page

News & Views


Netscout comments on DDoS surge

According to NETSCOUT’s latest Threat Intelligence Report (www.netscout.com/threatreport) threat actors have ramped up their nefarious activities in 1H2022.    We ask Richard Hummel, threat intelligence lead for NETSCOUT (www.netscout.com) how organizations in both the UK and Ireland can defend themselves from DDoS attacks given that Ireland has experienced an increase of 200% in DDoS attacks during the first half of the year.

“Attack sophistication is increasing.  At NETSCOUT our threat researchers have observed powerful DDoS-capable botnets being used to launch TCP-based direct path attacks, often in tandem with major global events across politics, religion, and sports.”

“As such it is vital for organizations to implement strong and effective cybersecurity tools.  Those tools should include threat intelligence to assist in blocking known adversary infrastructure.  Threat intelligence alone can block nearly 90% of DDoS attacks.  By utilizing several simple yet effective mitigation tactics – including restricting inbound traffic and preventing IP address spoofing – organizations can further reduce the impact of emerging DDoS threats.”

“It’s also crucial that businesses test their online infrastructure on a regular basis.  This ensures that any changes or adjustments made to applications, services and servers are incorporated into the DDoS defence strategy.  This ensures vital online business infrastructural features will be largely unaffected should they be on the receiving end of a DDoS attack.”

“Organizations should also consider enlisting the help of an on-demand DDoS attack specialist when navigating this unfamiliar landscape.  Expert advice and insight can greatly benefit individual teams, organisations and their stakeholders when faced with emerging DDoS attacks.  By correctly implementing these strategies, organizations in the UK, Ireland and indeed worldwide, can significantly decrease the impact of DDoS attacks on their online infrastructure.” 
bottom of page