The Online Integrity of your Digital Transformation

    Nothing will ever be as it was.
    Read More

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to take advantage of vulnerable programs, web...
    Read More

    HTML5 PING Attack & Mitigation Breakdown

    The HTML5 PING Attack HTML 5 has introduced many positive changes to web page structure and functionality. One of these has allowed web developers to send...
    Read More

    MazeBolt meets with large Corporates in Hamburg

    On 24 and 25 April 2019, at the old Customs House in Hamburg, MazeBolt was one of 54 companies backed by the European Innovation Council (EIC) pilot that...
    Read More

    MazeBolt Publishes State of DDoS Protection Report

    Ramat Gan, Israel
    Read More

    Understanding the CoAP DDoS Attack Vector

    There are new DDoS attacks everyday and CoAP is the latest. Their damage potential changes dramatically, based on many factors. It might be surprising to...
    Read More

    Mapping DDoS Attacks to Mitigation Mechanisms

    Management will always drive to minimize downtime and trust you to ensure that the DDoS mitigation solutions you have invested in can ensure that. With...
    Read More

    Preparation for DDoS Mitigation

    SlowLoris. UDP Flood. ACK Flood. The types of DDoS attacks really don’t matter - how well your mitigation protects you does! When testing their mitigation...
    Read More

    Mixing and Matching your DDoS Mitigation Approach

    Effective DDoS attack mitigation can be located on the cloud, on premise, or a hybrid combination of the two. No matter the type you choose, get ready for...
    Read More

    Reasons to Prioritize DDoS Protection

    Your team has spent hundreds of hours and millions of dollars protecting your organization against the most common cybersecurity attacks, like phishing,...
    Read More