Skip to main content
Netscout logo Netscout logo
  • Platform
  • Solutions
    • エンタープライズソリューション
    • Industries
    • By Role
    • Technology Partners
    • See all solutions
    • Observability
      • Network Observability
      • Network Performance Management
      • Application Performance Management
      • AIOps for Enterprise
      • Remote Site Observability
      • SaaS Application Observability
      • UC&C(ユニファイドコミュニケーション&コラボレーション)
      • Colocation Performance Management
      • Cloud Observability
    • Cybersecurity
      • Threat Investigation
      • Threat Hunting
      • Ransomware Resilience
      • Zero Trust Enablement
    • DDoS Protection
      • DDoS Mitigation for Enterprise
      • Firewall Protection
      • DNS Protection
      • Carpet Bombing Defense
      • Mobile Network Protection
    • コミュニケーションサービスプロバイダソリューション
      • 超高解像度の5G可視性
      • AIOps for Service Providers
      • 5G Network Slicing
      • Fixed Wireless Access
      • RAN Performance
    • See all industries
    • Financial Services
    • Education
    • Government
    • Healthcare
    • Insurance
    • Manufacturing
    • Pharmaceutical
    • Retail
    • Telecommunications
    • Transportation
    • Utilities
    • AI Operations
    • CIO
    • CISO
    • Network Operations
    • Security Operations
    • Site Reliability Engineering
    • AWS
    • Cisco Systems
    • Citrix
    • Dell Technologies
    • F5
    • Google Cloud
    • Microsoft
    • Oracle
    • Palo Alto Networks
    • Red Hat
    • ServiceNow
    • Splunk
    • VMware
  • 製品
    • Observability
    • Cybersecurity
    • DDoS Protection
    • Mobile and Fixed
    • AIOps
    • See all products
    • nGeniusONE for Enterprise
      Enable real-time visibility into any enterprise network environment to improve performance.
    • InfiniStreamNG
      Capture, store, and analyze packet-level data in real time to help optimize performance across IT infrastructures.
    • vSTREAM
      Improve visibility into virtualized and cloud environments with deep packet inspection.
    • nGeniusPULSE
      Continuously test and track the performance of applications and network services across all IT infrastructures.
    • nGenius Edge Sensor
      Improve visibility across remote sites and network edges to enable observability throughout your distributed network.
    • Omnis KlearSight Sensor
      Leverage eBPF to deliver packet-level visibility for Kubernetes performance and troubleshooting.
    • nGenius Packet Switches
      Packet flow switch architectures enable pervasive visibility across network environments.
    • Omnis Sensor
      Unparalleled telemetry insights at enterprise speed and scale across your entire IT ecosystem.
    • Omnis Streamer
      Build data pipelines that sift through the noise to improve IT operations and AI/ML workflows.
    • See all products
    • Omnis Cyber Intelligence
      Leverage packet-level insights to reduce the time between threat detection and response with threat investigation.
    • Omnis CyberStream
      Detect, investigate, and respond to cyberthreats in real-time by leveraging packet-level insights.
    • nGenius Decryption Appliance
      Decrypt SSL and TLS-encrypted traffic to enable visibility into hidden threats within network traffic.
    • Omnis Sensor
      Unparalleled telemetry insights at enterprise speed and scale across your entire IT ecosystem.
    • Omnis Streamer
      Build data pipelines that sift through the noise to improve IT operations and AI/ML workflows.
    • See all products
    • Arbor Sightline
      Leverage network intelligence to detect, analyze, and respond to DDoS threats across the most complex networks.
    • Arbor Edge Defense
      Powerful AI/ML-powered stateless DDoS protection helps maintain availability to critical services and applications.
    • Arbor Sightline Mobile
      Safeguard mobile services and ensure network performance and security.
    • Arbor Cloud
      Cloud DDoS protection that defends against large-scale, volumetric attacks.
    • Arbor Threat Mitigation System
      Detect, mitigate, and prevent DDoS attacks with real-time traffic analysis and automated attack mitigation.
    • Arbor ATLAS Threat Intelligence
      Gain insights into current cyberthreats and their tactics, enhancing DDoS protection solutions.
    • See all products
    • nGeniusONE for Carrier
      Assure a premium user experience with end-to-end visibility across network domains, service enablers, and devices.
    • InfiniStreamNG
      Access real-time views of RAN control plane for end-to-end visibility across physical and virtual network environments.
    • InfiniStreamNG RAN
      Prioritize the mobile subscriber experience with scalable, cost-effective and cloud-ready RAN network monitoring.
    • nGenius Session Analyzer
      Isolate and resolve congestion and interference problems contributing to 70% of all subscriber issues.
    • TrueCall
      Improve your understanding of network capacity and complexity with true user performance insights.
    • Omnis RAN
      Stay ahead of capacity and mobility targets with unique Al-ready datasets aligned to address growing RAN complexities.
    • See all products
    • Omnis Sensor
      Unparalleled telemetry insights at enterprise speed and scale across your entire IT ecosystem.
    • Omnis Streamer
      Build data pipelines that sift through the noise to improve IT operations and AI/ML workflows.
  • Support & Resources
    • Blogs, Resources, & Webinars
    • Intelligence & Reports
    • サポート&サービス
    • Blog
      Stay updated with the latest insights, tips, and news on our blog.
    • Resource Library
      Explore the latest case studies, whitepapers, eBooks, and more to discover real-world applications of our products and solutions.
    • Learning Center
      Quickly learn the definitions of key phrases in networking, security, and DDoS.
    • Webinars
      Gain insights from product and industry experts through our live & on-demand webinars.
    • ASERT Threat Intelligence Team
      Meet the ASERT team, the leading experts on DDoS and cyber threat intelligence.
    • DDoS Threat Intelligence Report
      Learn about the latest DDoS trends and statistics powered by NETSCOUT’s industry-leading global internet traffic visibility.
    • Cyber Threat Horizon
      Look at live DDoS attack maps to discover what attacks are occurring in real-time.
    • Overview
      Get support for your products and solutions to maximize the value of your investment.
    • My.NETSCOUT
      Existing customers, log in to MyNETSCOUT to access additional assets, resources, and support channels.
    • NETSCOUT University
      Our mission is to help you and your team to successfully implement NETSCOUT’s solutions so that your network functions seamlessly and effectively.
    • NO LATENCY
      Explore tech tips, use cases, and more in our NO LATENCY newsletter.
  • 企業情報
    • About Us
    • News & Events
    • Partners
    • About Us
    • Board of Directors
    • Careers
    • Customer Reviews
    • Environmental, Social, and Governance
    • Executive Team
    • Industry Analyst Perspectives
    • Investor Relations
    • Trust Center
    • Events
    • Newsroom
    • Partner Portal
    • Become a Partner
      • Learn about our NETSCOUT Connect 360 partner program.

myNETSCOUT

  • 攻撃されたら、1-734-794-5099にご連絡を
  • お問い合わせ

myNETSCOUT

  • 攻撃されたら、1-734-794-5099にご連絡を
  • お問い合わせ

Search

Filter results

  • Authors (60)
  • Blog (793)
  • Case Studies (198)
  • Event (25)
  • FAQ (92)
  • flexibleproduct (44)
  • Leadership (20)
  • Other (198)
  • Products (2)
  • Solutions (90)
  • Success Stories (45)
  • Webinar (5)
793 results
NETSCOUT Blog

WannaCry

Information regarding the WannaCry ransomware is spreading as quickly as the malware itself and is expected to do so throughout the weekend. This blog provides some information...
Blog
13th May, 2017
Praying Mantis

Greenbug’s DNS-isms

Over the past few months there has been a lot of research and press coverage on the Shamoon campaigns. These have been the attacks on Saudi Arabian companies where a destructive...
Blog
1st May, 2017
NETSCOUT Blog

Observed Spike in DDoS Attacks Targeting Hong Kong

Introduction Each week ASERT produces a weekly threat intelligence bulletin for Arbor customers. In addition to providing insights into the week's security news and reviewing ASERT...
Blog
23rd Apr, 2017
M

Acronym: M is for Malware

A malware researcher known as Antelox recently tweeted about an unknown malware sample that caught our eye. Upon further investigation, it is a modular malware known as Acronym and...
Blog
15th Mar, 2017
NETSCOUT Blog

Change All Your Passwords, Right Now!

by Steinthor Bjarnason, Senior ASERT Security Analyst and Roland Dobbins, ASERT Principal Engineer CloudFlare are probably best known as a DDoS mitigation service provider, but...
Blog
24th Feb, 2017

Additional Insights on Shamoon2

IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2 malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle...
Blog
21st Feb, 2017
Non-Government Organization in Support of Government Hopes

Non-Government Organization in Support of Government Hopes

Red Team analysis is the process of viewing a situation from the perspective of an adversary thus providing insights beyond those that might otherwise be limited by normative biases.
Blog
22nd Dec, 2016
Dismantling a Nuclear Bot

Dismantling a Nuclear Bot

A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the price of another recent entry to the marke
Blog
19th Dec, 2016

On the Economics, Propagation, and Mitigation of Mirai

In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally provided in the leaked Mirai source code.
Blog
14th Dec, 2016
NETSCOUT Blog

Analysis of CryptFile2 Ransomware Server

This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and Win32/Filecoder.HydraCrypt.C) ransomware...
Blog
14th Dec, 2016
Diving Into Buhtrap Banking Trojan Activity

Diving Into Buhtrap Banking Trojan Activity

Cyphort recently published an article about the Buhtrap banking trojan [ https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian...
Blog
21st Nov, 2016
FlokiBot

FlokiBot: A Flock of Bots?

In early October, Flashpoint released an analysis of an underground forum advertisement for a new malware family known as FlokiBot. It took some time before a sample was found in...
Blog
21st Nov, 2016
NETSCOUT Blog

Flying Dragon Eye: Uyghur Themed Threat Activity

DOWNLOAD FULL REPORT HERE DOWNLOAD INDICATORS OF COMPROMISE (IOCs) HERE This paper documents attempted exploitation activity aimed at Uyghur interests outside of China...
Blog
1st Nov, 2016
NETSCOUT Blog

Mirai IoT Botnet Description and DDoS Attack Mitigation

Since its inception in August of 2016, the Mirai ‘Internet-of-Things’ (IoT) botnet, comprised largely of internet-enabled digital video recorders (DVRs), surveillance cameras, and other Internet-enabled embedded devices, has been utilized by attackers to launch multiple high-profile, high-impact DDoS attacks against various Internet properties and services
Blog
26th Oct, 2016
rickBot Banker Insights

TrickBot Banker Insights

A new banking trojan, TrickBot, has seemingly risen from the ashes left behind by the November 2015 takedown of Dyreza/Dyre infrastructure and the arrests of threat actors identified by Russian authorities. Dyreza was used to target customers of over 1000 U.S. and U.K. banks and other companies during the peak of operations.
Blog
25th Oct, 2016
NETSCOUT Blog

How to create a Full Packet Capture

Once you’ve decided that you’d like to start doing full packet capture, You may well ask how? Learn about these basic steps in performing full packet captures.
Blog
19th Feb, 2013
NETSCOUT Blog

DDoS Attacks on SSL: Something Old, Something New

SSL (or TLS) secures web services such as banking, online purchases, email and remote access. Popular services such as Twitter, Hotmail and Facebook are increasingly migrating to...
Blog
24th Apr, 2012
NETSCOUT Blog

Attack of the Shuriken: Many Hands, Many Weapons

A visual sample of Distributed Denial of Service (DDoS or DoS) attack tools & services compiled by Curt Wilson - Research Analyst, Arbor Networks ASERT There are a variety of...
Blog
7th Feb, 2012
  • Load more results
Netscout orb logo

Guardians of the Connected World®

  • 製品概要
    • Platform
    • エンタープライズソリューション
    • 通信サービスプロバイダー向けソリューション
    • DDoS Protection
    • All Solutions
    • 製品
  • 各種リソース
    • ブログ
    • リソースライブラリ
    • ラーニングセンター
    • MyNETSCOUT
    • イベント
    • ウェビナー
  • 会社概要
    • About Us
    • 採用情報
    • Environmental, Social, and Governance
    • 投資家向け情報
    • ニュースとメディア
    • パートナー
  • お問い合わせ
    • 1-888-357-7667
    • アクセス
    • Under DDoS Attack?

© 2026 NETSCOUT

  • Terms & Conditions
  • Website Terms of Use
  • Data Privacy and Trust Center
  • Transparency in Supply Chains
  • Privacy Policy
  • Vendor Portal
  • Do Not Sell or Share My Personal Information
  • California Privacy Notice
  • UK Disclosure