Full story First attack – The first attack was held on November 10th, 2025, at about 8:30 am, and alerts began to be received regarding the detection of attacks on the Hosting customer’s IP addresses and the upstream ISP addresses. The system identified an attack on about 500 IP addresses that included several vectors of attack, to 2 destination ports (0,443) with a capacity of 11.3 GB of traffic that was blocked by FlowSec’s system. The attacks lasted for about 1 hour, while the Packet Per Second Traffic reached about 1.3M PPS. The attack protocols were ICMP, UDP, and…
In the evolving landscape of cybersecurity, Internet Service Providers (ISPs) hold a unique strategic position. They operate the infrastructure where attacks first appear, they serve thousands of organizations simultaneously, and they are responsible for maintaining national-scale connectivity. As attacks become more sophisticated and dynamic, ISPs can no longer rely solely on automated mitigation — they need deep, real-time understanding of how their networks behave. This is where advanced operational intelligence tools — similar in purpose to Flow Assistant — are reshaping ISP cyber defense strategies. These tools give Network Operations Centers (NOCs), security teams, and engineers unprecedented visibility into traffic…
Full story On November 9th, 2025, at about 8:00 am, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 450 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 3 hours, with an increase in the peak volume of the attack to about 8 GB, 16 GB, and up to 23.4 GB, while the Packet Per Second traffic reached from about 800K up to 3.2M PPS. The attack protocols were UDP, ICMP,…
Full Story On October 5th, 2025, at about 10:30, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 280 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 5 hours, with an increase in the peak volume of the attack to about 6 GB, 10 GB, and up to 13.8 GB, while the Packet Per Second traffic reached from about 400K up to 1.3M PPS. The attack protocols were TCP (ACK, PSH)….
For years, Internet Service Providers (ISPs) were viewed primarily as connectivity providers — responsible for stable bandwidth, uptime, and network infrastructure. Cybersecurity was considered “someone else’s job”: enterprises installed firewalls, SMBs relied on basic antivirus tools, and cloud vendors offered optional add-on protections. But as modern cybersecurity threats grow more aggressive and complex, a fundamental shift is taking place: customers now expect their ISP to be a frontline security partner, not just a bandwidth supplier. This transformation did not happen overnight. A combination of evolving threats, market failures, and technological innovation has made the ISP’s role in cybersecurity not only…
What a 700% Cyberattack Surge Says About the Future of DDoS Defense Strategy for ISPs This past week, Israel Hayom (a major Israeli news outlet) reported a 700% increase in cyberattacks targeting Israeli networks, including a sharp rise in DDoS (Distributed Denial of Service) attacks, which aim to overwhelm and disable critical infrastructure and online services. Internet Service Providers (ISPs), Government websites, critical infrastructure, and many business customers all saw a dramatic spike. The volume alone raised alarms. But the bigger story is what this tells us about the evolving role of ISPs in national and global cybersecurity. A New…
Introduction In the evolving landscape of cybersecurity, the interplay between offensive and defensive Artificial Intelligence (AI) has become a focal point, including in Distributed Denial of Service (DDoS) attacks. Advanced AI adoption, such as the emerging Agentic AI, which create autonomous agents has the potential to escalate this “AI Warfare”, this post examines some of the offensive and defensive DDoS AI techniques and peeks into the potential future in which agentic AI is adopted by both sides. Offensive AI: Enhancing DDoS Attack Sophistication Cybercriminals are now leveraging AI to launch attacks with greater precision. Machine learning algorithms can analyze vast…
Introduction Distributed Denial of Service (DDoS) attacks are among the most persistent and evolving threats in the cybersecurity landscape. Leveraging massive traffic volumes to overwhelm networks, DDoS attacks can cause service disruptions, financial losses, and reputational damage. As attackers adopt sophisticated multi-vector strategies, traditional centralized security measures like rate limiting and IP blacklisting are no longer sufficient. This has given rise to edge security solutions that protect networks, applications, and data at their origin, closer to users and devices, ensuring operational continuity in a decentralized environment. The Shift Toward Edge Security Edge security focuses on safeguarding distributed environments such as…
Flowsec technology equips CSP/ ISP companies with advanced AI and real-time traffic analysis, delivering seamless DDoS protection and enabling effective customer defense while opening new revenue streams.
Remember when a website going down was just an inconvenience? Those days are long gone. Today’s Distributed Denial of Service (DDoS) attacks have evolved from minor disruptions into weapons capable of bringing entire organizations to their knees. Let’s explore this remarkable transformation and understand what it means for our digital future. The Birth of a Digital Threat In 1999, the University of Minnesota experienced something unprecedented: their computer systems were overwhelmed by a flood of traffic from multiple sources. This first documented DDoS attack, while primitive by today’s standards, marked the beginning of a new era in cybersecurity threats. Back…
Flowsec Ltd.
Flowsec provides cutting-edge SaaS DDoS protection solutions for ISPs, CSPs, enterprises, MSSPs, and the national security sector. With multi-tenant and global shield technology, Flowsec enables communication service providers to offer advanced DDoS protection services to their customers.