The Online Integrity of your Digital Transformation

Nothing will ever be as it was.
Read More

Diamonds are Forever. So are DDoS Vulnerabilities.

Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to take advantage of vulnerable programs, web...
Read More

HTML5 PING Attack & Mitigation Breakdown

The HTML5 PING Attack HTML 5 has introduced many positive changes to web page structure and functionality. One of these has allowed web developers to send...
Read More

MazeBolt meets with large Corporates in Hamburg

On 24 and 25 April 2019, at the old Customs House in Hamburg, MazeBolt was one of 54 companies backed by the European Innovation Council (EIC) pilot that...
Read More

MazeBolt Publishes State of DDoS Protection Report

Ramat Gan, Israel
Read More

Understanding the CoAP DDoS Attack Vector

There are new DDoS attacks everyday and CoAP is the latest. Their damage potential changes dramatically, based on many factors. It might be surprising to...
Read More

Mapping DDoS Attacks to Mitigation Mechanisms

Management will always drive to minimize downtime and trust you to ensure that the DDoS mitigation solutions you have invested in can ensure that. With...
Read More

Preparation for DDoS Mitigation

SlowLoris. UDP Flood. ACK Flood. The types of DDoS attacks really don’t matter - how well your mitigation protects you does! When testing their mitigation...
Read More

Mixing and Matching your DDoS Mitigation Approach

Effective DDoS attack mitigation can be located on the cloud, on premise, or a hybrid combination of the two. No matter the type you choose, get ready for...
Read More

Reasons to Prioritize DDoS Protection

Your team has spent hundreds of hours and millions of dollars protecting your organization against the most common cybersecurity attacks, like phishing,...
Read More