PREVIEW
... iversity, involving some internal research documents.
The attackers did not involve a botnet, but instead exploited an amplification effect of a popular database caching system called memcached.
Eventually, they flooded the memcached server with deceptive requests, amplifying their attack by thousands, even tens of thousands of times.
This is a relatively novel attack method, with high technical demands that currently only a limited number of individuals can accomplish. < ...
YOU MAY ALSO LIKE



























