DDoSPedia An Online Encyclopedia Of Cyberattack and Cybersecurity Terms
Security Research Center
This is a flood technique focused on SIP application protocol which involves illegitimate call requests. The idea here is to flood the Session Boarder Control (SBC) and / or SIP / VOIP PBX with too many requests to handle and thus making the service unavailable.
The Threats Are Real And They Have Evolved Understand The Evolution of Threat Actors In A Post-Pandemic World Download Series 1 of the 2021 Hacker's Almanac
Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.
We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.
Connect with experts and join the conversation about Radware technologies.