Dissecting DDoS Attacks

Introduction Distributed Denial of Service (DDoS) attacks are designed to prevent or degrade online services. This blog post will explain, in extremely basic terms, a specific type of attack called a Reflection/Amplification DDoS Attack. This post is not intended to serve as a comprehensive technical guide, but merely a relatively non-technical overview for the novice.... Continue Reading →

We Got Zoom Bombed

Do we ever grow up? Image presented by Zoom bomber. We recently hosted an invite-only meeting with some of our business partners and clients. We followed most of the basic security measures and best practices for Zoom calls. Yet we got Zoom Bombed! How? The technical details are not the core story here, though we... Continue Reading →

Puzzle Me This: Context From Curiosity

One definition of 'proxy' is "a figure that can be used to represent the value of something in a calculation." Proxy servers are used for various purposes, some for hiding their true origination IP address for malicious intent; while others for circumventing totalitarian government censorship. Regardless of the use of proxies, with Augury we make... Continue Reading →

Up ↑