{"id":35642,"date":"2020-06-19T17:31:15","date_gmt":"2020-06-19T17:31:15","guid":{"rendered":"http:\/\/5e17438e-64ae-473e-8f01-530dea2d227c"},"modified":"2020-06-19T17:31:15","modified_gmt":"2020-06-19T17:31:15","slug":"academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/","title":{"rendered":"Academics studied DDoS takedowns and said they&#8217;re ineffective, recommend patching vulnerable servers"},"content":{"rendered":"<p>A team of Dutch and German academics has studied the aftermath of a major crackdown against DDoS providers and concluded that law enforcement takedowns are largely ineffective, recommending that authorities rather focus on patching the vulnerable systems that are abused for the DDoS attacks in the first place.<\/p>\n<p>The study, published last year on paper-hosting service arXiv, analyzed how the DDoS-for-hire market was impacted after US and European law enforcement shut down 15 major DDoS-for-hire (aka DDoS booter, DDoS stresser) services <a href=\"https:\/\/www.justice.gov\/opa\/pr\/criminal-charges-filed-los-angeles-and-alaska-conjunction-seizures-15-websites-offering-ddos\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in December 2018<\/a>.<\/p>\n<p>The research team said it analyzed DDoS attack traffic observed at the level of three different major networks &#8212; a tier-1 internet service provider, a tier-2 internet service provider, and a major IXP (internet exchange point).<\/p>\n<p>&#8220;The takedown immediately reduced the DDoS amplification traffic to reflectors,&#8221; the research team said. &#8220;However, it did not have any significant effect on DDoS traffic hitting victims or on the number of attacks observed.&#8221;<\/p>\n<p>By reflectors, the research team is referring to vulnerable servers abused during a DDoS attack.<\/p>\n<p>As their name implies, these servers &#8220;reflect&#8221; traffic from the attacker to the victim. In case the servers run a vulnerable protocol that can also amplify the attacker&#8217;s traffic, they are also called amplifiers.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/06\/19\/1afd1968-c087-407d-93e9-47e4565c701d\/resize\/370xauto\/4dde1a0555a335ea4610fa8e00d2bc55\/ddos-amplifier.jpg\" class alt=\"ddos-amplifier.jpg\" height=\"auto\" width=\"370\"><\/span> <span class=\"credit\">Image via &#8220;TFTP DDoS amplification attack&#8221; by Buchanan et al.<\/span><\/p>\n<p>Academics say their study revealed there was an overabundance of DDoS-for-hire services that were oversaturating DDoS reflectors (vulnerable servers).<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>After the takedown, there were fewer DDoS gangs fighting for the reflector&#8217;s bandwidth, but the volume of DDoS traffic hitting victims remained the same.<\/p>\n<p>While the takedown attempt served its purpose to thin the herd in terms of DDoS-for-hire gangs, academics argue that a better solution to reduce the number of DDoS attacks would be to reduce the number of available reflectors (vulnerable servers).<\/p>\n<p>&#8220;Our study aims to inform network operators to better understand the current threat-level, but also law enforcement agencies to recognize the need of additional efforts to shut down or block open reflectors,&#8221; academics said.<\/p>\n<p>Furthermore, the study also made an interesting observation when it also analyzed the number of DDoS-for-hire domains available in the Alexa Top 1 Million traffic rank.<\/p>\n<p>Rhe research team said the takedown barely scraped the surface when it came to the number of DDoS-for-hire services available online, with the number of DDoS booter domains going up after the December 2018 takedown.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\" class=\"lazy\" alt=\"ddos-alexa-rank.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/06\/19\/8b42e66e-3956-4372-affd-4dd1d6bde951\/ddos-alexa-rank.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/06\/19\/8b42e66e-3956-4372-affd-4dd1d6bde951\/ddos-alexa-rank.png\" class alt=\"ddos-alexa-rank.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Kopp et al.<\/span><\/p>\n<p><em>The full study, titled &#8220;<\/em><a href=\"https:\/\/arxiv.org\/abs\/1909.07455\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><em>DDoS Hide &amp; Seek: On the Effectiveness of a Booter Services Takedown<\/em><\/a><em>,&#8221; is also available for download.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The volume of DDoS traffic to victims remained the same. The number of DDoS-for-hire domains went up.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35643,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Academics studied DDoS takedowns and said they&#039;re ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Academics studied DDoS takedowns and said they&#039;re ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T17:31:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"370\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Academics studied DDoS takedowns and said they&#8217;re ineffective, recommend patching vulnerable servers\",\"datePublished\":\"2020-06-19T17:31:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\"},\"wordCount\":430,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\",\"name\":\"Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg\",\"datePublished\":\"2020-06-19T17:31:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg\",\"width\":370,\"height\":351},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Academics studied DDoS takedowns and said they&#8217;re ineffective, recommend patching vulnerable servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/","og_locale":"en_US","og_type":"article","og_title":"Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-19T17:31:15+00:00","og_image":[{"width":370,"height":351,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Academics studied DDoS takedowns and said they&#8217;re ineffective, recommend patching vulnerable servers","datePublished":"2020-06-19T17:31:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/"},"wordCount":430,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/","url":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/","name":"Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg","datePublished":"2020-06-19T17:31:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers.jpg","width":370,"height":351},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Academics studied DDoS takedowns and said they&#8217;re ineffective, recommend patching vulnerable servers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35642"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35643"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}