How Lorikeet Security stopped a live DDoS attack mid-training, without dropping a single student
When a multi-vector DDoS attack hit Lorikeet Security's live cybersecurity training event mid-session, Flowtri...
12 min read →Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.
All features →From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.
Talk to Us →Blog
Practical guides from engineers who've been DDoS'd and learned from it.
NTP amplification reflector distribution, SYN flood source analysis, the FlowSpec rules that fired, PCAP forensics, and a second-by-second timeline of the March 27 Lorikeet Security incident.
When a multi-vector DDoS attack hit Lorikeet Security's live cybersecurity training event mid-session, Flowtri...
12 min read →How compromised MikroTik routers were weaponized for packet-rate attacks peaking at 840 Mpps, why PPS matters ...
13 min read →CVE-2023-44487 exploited HTTP/2 stream multiplexing to generate the largest application-layer DDoS ever record...
13 min read →A technical post-mortem of the February 2020 CLDAP reflection attack: 2.3 Tbps of amplified traffic via UDP po...
12 min read →How a 15-byte UDP request to exposed memcached servers generated 1.35 Tbps of amplified traffic, no botnet req...
14 min read →Three waves of DNS query floods from a Mirai botnet brought Dyn's managed DNS to its knees, taking Twitter, Ne...
15 min read →Newsletter
One email a month. Real attack postmortems, detection techniques, and engineering insights. No marketing fluff.
No spam. Unsubscribe any time.