DigiCert Team

Articles by DigiCert Team

October 17, 2025

Watering Hole Attack

Learn how watering hole attacks work, real-world examples, and proven strategies to prevent them. Discover DigiCert solutions for advanced cybersecurity protection.
October 17, 2025

URL Poisoning

URL poisoning manipulates links to redirect users to malicious sites. Learn how it works, real-world examples, business risks, and key prevention steps.
October 17, 2025

Unrestricted Resource Consumption in APIs

Unrestricted API resource consumption can cause outages, costs, and security risks. Learn causes, examples, business impact, and key prevention steps.
October 17, 2025

SSDP Amplification DDoS Attacks

SSDP amplification DDoS exploits vulnerable devices to flood networks with traffic. Learn how these attacks work, their impact, and key prevention steps.
October 17, 2025

SNMP Amplification DDoS

SNMP amplification DDoS attacks flood networks using spoofed queries and unsecured servers. Learn risks, real-world cases, and prevention strategies.
October 17, 2025

#RefRef DoS Tool

#RefRef DoS exploits SQL injection to trigger resource-heavy queries, crippling servers with little traffic. Learn its risks, real cases, and core defenses.
October 17, 2025

R-U-Dead-Yet? DoS

Learn how R.U.D.Y. low-and-slow HTTP POST attacks exhaust web apps via Content-Length abuse, plus detection and defense with timeouts, WAFs, and rate limits.
October 17, 2025

QUIC Flood DDoS

Learn how QUIC flood DDoS attacks exploit speed and encryption to overwhelm servers, and discover strategies to defend against this rising cyber threat.
October 8, 2025

Ping of Death Denial of Service (DoS) Attack

Discover how Ping of Death DoS attacks crash systems with oversized packets, their history, impacts on business, and modern strategies for defense.
October 8, 2025

Multicast DNS (mDNS) Amplification DDoS

Learn how mDNS amplification DDoS attacks exploit misconfigured devices, amplify traffic, and threaten networks, plus steps to protect your systems.
October 8, 2025

IP Fragmentation Attacks

Learn how IP fragmentation attacks exploit network vulnerabilities to bypass security, overload systems, and cause service disruptions. Discover how to mitigate these risks.
October 6, 2025

CDN Routing for a Multi-CDN Architecture

In a multi-CDN architecture each CDN has its own routing strategy so CDN routing is critical for optimizing performance.
  • Solutions
  • Products
  • Industries
  • Why Vercara
  • Plans
  • Partners
  • Resources
  • Company