Threat Hunting for DDoS Activity and Geographic Irregularities

CERT-LatestNews DDoS-Threats ThreatsCybercrime

Introduction. So there you are, sitting at your desk at the organization where you work as an information security professional. You are performing your usual monitoring duties when you notice that you have a high volume of network traffic coming from a part of the world that your organization does not do business with.