Infrastructure Security

New vectors, new techniques – the evolution of DDoS attacks