When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Theyre getting larger, too.
Lets examine the impact more closely.
(Image credit: Shutterstock)
The two most common attack vectors of this include HTTPS Floods and NTP Amplifications.
It sendsserversinto timeout hell with incessant answer requests for downtime.
These attacks are not just an inconvenience.
In 2019, Facebooks 14-hour outage cost the company $90 million.
From an attackers perspective, thats a lucratively massive attack surface.
If you cut off a communication service providers (CSP) service-critical function, all itscustomerswill fall like dominoes.
Thats just what the threat towards consumers looks like.
This makes the junk traffic much harder forcybersecuritymethods like thresholds andfirewallsto detect.
In some ways, this attack is more nefarious and devious than traditional attacks.
Such loss would undoubtedly impact future business.
You have a rather poisonous stew when you combine those bits and pieces with5Gand data-hungryAI-enabledapplications.
The traffic volume will grow significantly across networks, presenting even more hiding spots for these attacks.
Telcos arent oblivious to the threat.
Telcos will need to apply some care in the protection they implement.
The result should be a powerful bundle that is just as much about managed security as connectivity.
The best of both worlds is safer customers and a new revenue stream.
We’ve featured the best productivity tool.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro