Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

The Real-World Impact on Cyber Warfare: Analyzing DDoS Trends

Truth in IT
03/25/2024
59
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: From their technical perspective, you're seeing a lot of, uh, traffic and information, though, that starts to say, hey, these these attacks are coming from certain places and going certain places, and they're probably due to certain things going on in the real world. Uh, real, real events that are happening, you know, regional conflicts, things that have the potential to boil over and get lots of lots of people moving, especially if it's cheap and easy to create a botnet these days. Uh, so what do you have any insight as to as to how what goes on in the real world affects the DDoS uh, situation with with websites? Mike Ripley: Absolutely. I can take this one, Mike. Uh, I think the main thing that we're typically seeing is that, as you kind of highlighted, right, there's a lot of ongoing conflicts, right, between, you know, things going on in the Middle East and otherwise. And so when we take a look at, uh, one example, right, the Israeli Palestinian conflict, we saw this massive uptick in http, DDoS attacks on both Israeli and Palestinian websites. And, you know, looking at Israeli websites, we saw roughly 27% increase quarter over quarter, um, from Q3 to Q4. And then looking at Palestinian websites, you you can, you know, see it for yourself. That's over an 1,100% increase, um, in relative to the region's traffic. Um, Palestinian territories were the second most attacked region by Http, DDoS attacks in Q4, and then over 10% of all, you know, Http requests that we saw towards Palestinian websites were DDoS attacks. So just to give you a sense of the numbers there. Mike Matchett: Yeah. So it does look like this affects both sides in any sort of, uh, conflict as as it's easy, easy cost of entry for anybody around the world to, to spin up a DDoS attack in some ways and, and just go after it. Right. They, they don't have to have penetrated, as you said, they can just be throwing traffic up against, uh, against IP addresses or DNS services in those areas. Right. And target them. Um, you know, I found it interesting too, Mike. Uh, maybe, you know, Omar mentioned earlier that going after climate change, people. What is that about? What did you see there? Mike Ripley: Yeah, absolutely. So typically in the, you know, fourth quarter of every year, the United Nation puts on their, uh, climate change conference. So this is something where we typically see a massive uptick in terms of attacks against environmental service industry. And, you know, the numbers speak for themselves. Right? We saw over a, you know, 60, almost 62,000% increase in attacks towards environmental services websites. And so what this really means is that they are experiencing this massive surge every year. Right? Because Cop 28 this year took place from November 30th to the December 12th. And it's a pretty important event because it signals what many considered the end of the fossil fuel era. So to coincide with that, we saw this massive uptick. And we've noticed this over the last few years as Cop takes place every year. You know, cop 26, Cop 27, as well as other sort of UN related environmental, uh, resolutions and announcements. We see a similar pattern every year.
Explore the nexus between global conflicts and surges in DDoS attacks, with insights into significant spikes targeting Israeli and Palestinian websites. Understand how annual events like COP28 also trigger an influx of cyberattacks against environmental agencies, showcasing the increasing use of botnets as tools for international contention.
Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
Channels:
  • Prevent Botnets, DDoS and other Cyber-Vandalism with Cloudflare
News:
Events:
Tags:
  • cloudflare
  • ddos
  • botnets
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: The Real-World Impact on Cyber Warfare: Analyzing DDoS Trends

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT service delivery workflows that close the efficiency gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Upcoming Industry Events

                • Jan
                  29

                  Preparing Your Cybersecurity Strategy for the Challenges of 2026

                  01/29/202610:00 AM ET
                  More events

                  Recent Spotlight Events

                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    • Dec
                      02

                      The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                      12/02/202501:00 PM ET
                      • Nov
                        20

                        Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                        11/20/202501:00 PM ET
                        More events

                        Recent Industry Events

                        • Dec
                          18

                          Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                          12/18/202501:00 PM ET
                          • Dec
                            16

                            HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                            12/16/202501:00 PM ET
                            • Dec
                              11

                              Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                              12/11/202501:00 PM ET
                              More events
                              Truth in IT
                              • Sponsor
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Preference Management
                              Desktop version
                              Standard version