Israel’s telecommunications infrastructure is among the most critical – and most targeted – in the world. According to Yigal Unna, Former director general of Israel National Cyber Directorate and also former head of Shin-bet Cyber Division. at Shin Bet, Israel faces more cyber-attacks than any other nation, yet continues to defend itself effectively through multiple layers of advanced protection. In a recent interview on Galei Tzahal Radio Station, on the program by Sefi Ovadia and Yanir Cozin, Unna highlighted the strength of Israel’s telecommunications defense: “With the most advanced Israeli technologies, telecommunications companies are protected by Flowsec and several other…
Full story First attack – The first attack was held on November 10th, 2025, at about 8:30 am, and alerts began to be received regarding the detection of attacks on the Hosting customer’s IP addresses and the upstream ISP addresses. The system identified an attack on about 500 IP addresses that included several vectors of attack, to 2 destination ports (0,443) with a capacity of 11.3 GB of traffic that was blocked by FlowSec’s system. The attacks lasted for about 1 hour, while the Packet Per Second Traffic reached about 1.3M PPS. The attack protocols were ICMP, UDP, and…
In the evolving landscape of cybersecurity, Internet Service Providers (ISPs) hold a unique strategic position. They operate the infrastructure where attacks first appear, they serve thousands of organizations simultaneously, and they are responsible for maintaining national-scale connectivity. As attacks become more sophisticated and dynamic, ISPs can no longer rely solely on automated mitigation — they need deep, real-time understanding of how their networks behave. This is where advanced operational intelligence tools — similar in purpose to Flow Assistant — are reshaping ISP cyber defense strategies. These tools give Network Operations Centers (NOCs), security teams, and engineers unprecedented visibility into traffic…
Full story On November 9th, 2025, at about 8:00 am, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 450 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 3 hours, with an increase in the peak volume of the attack to about 8 GB, 16 GB, and up to 23.4 GB, while the Packet Per Second traffic reached from about 800K up to 3.2M PPS. The attack protocols were UDP, ICMP,…
Blackholing has long been the default response to large-scale DDoS attacks. It works – by dropping all traffic to the target. Sure, the attack stops.But so does your service. Your traffic. Your business. At Flowsec, we take a more precise approach.Using the ISP resources and real-time AI traffic classification, we distinguish between malicious traffic (red) and legitimate traffic (green) – Blocking only what’s harmful. ✓ Service stays online✓ Customers stay connected✓ Your team stays in control In addition, our multi-tenant SaaS platform protects ISP networks with zero service disruption, even under massive attacks. Combined with global signature sharing, we ensure…
Full Story On October 5th, 2025, at about 10:30, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 280 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 5 hours, with an increase in the peak volume of the attack to about 6 GB, 10 GB, and up to 13.8 GB, while the Packet Per Second traffic reached from about 400K up to 1.3M PPS. The attack protocols were TCP (ACK, PSH)….
DDoS attacks have become more sophisticated, and so have the risks of blocking legitimate traffic while trying to fend them off. Blackholing stops attacks by dropping all traffic – including legitimate users, causing full service disruption, loss of business continuity, and revenue impact. Flowsec’s solution feels different because it “feels” different. Using machine learning to accurately classify “red” malicious attack traffic from “green”, normal and legitimate flows, Flowsec stops attacks in their tracks. WITHOUT COLLATERAL DAMAGE. Flowsec delivers a no-blackholing approach trusted by top SPs worldwide, protecting customer activity so users keep working as usual even during attacks. Understand how…
Onboarding new customers for DDoS protection often feels like wrestling with heavy hardware and endless network tweaks.Connecting a new customer should be as simple as clicking a button.Flowsec’s SaaS platform makes that possible. Users provide just a handful of simple system details: user name and password, link capacity, and network IP, and the system takes it from there – learning and adapting automatically.No need for network experts, No hardware to install. No network downtime. Onboarding done right. Instant, scalable protection that just works.
DDoS attacks have evolved, growing bigger, more unpredictable, and far more clever. The old ways of blocking threats with rigid rules or clunky hardware just can’t keep up anymore. The worst part is that legitimate users often get caught in the crossfire, slowing down networks or losing access altogether. Flowsec’s machine learning technology watches your network 24/7, learning what ‘normal’ traffic looks like and adapting as it shifts. It generates attack signatures and shares them in real time across global ISP networks, blocking threats before they become crises. All of this happens seamlessly, with no infrastructure changes and no interruptions,…
Flowsec is at FIFE25, the hub for cyber intelligence, digital forensics, and innovative solutions.We’re excited to join national and international experts, explore real cases, and be part of shaping the future of cyber tech.
Flowsec Ltd.
Flowsec provides cutting-edge SaaS DDoS protection solutions for ISPs, CSPs, enterprises, MSSPs, and the national security sector. With multi-tenant and global shield technology, Flowsec enables communication service providers to offer advanced DDoS protection services to their customers.