Monitor icon
Monitor
Network Visibility

Service Providers DDoS Protection

Large DDoS Attacks on a Hosting customer with Global shield protection

Full story First attack – The first attack was held on November 10th, 2025, at about 8:30 am, and alerts began to be received regarding the detection of attacks on the Hosting customer’s IP addresses and the upstream ISP addresses. The system identified an attack on about 500 IP addresses that included several vectors of attack, to 2 destination ports (0,443) with a capacity of 11.3 GB of traffic that was blocked by FlowSec’s system.   The attacks lasted for about 1 hour, while the Packet Per Second Traffic reached about 1.3M PPS. The attack protocols were ICMP, UDP, and…


Why Performance Insight Matters: The Strategic Role of Flow Assistant–Style Tools in ISP Cyber Defense

In the evolving landscape of cybersecurity, Internet Service Providers (ISPs) hold a unique strategic position. They operate the infrastructure where attacks first appear, they serve thousands of organizations simultaneously, and they are responsible for maintaining national-scale connectivity. As attacks become more sophisticated and dynamic, ISPs can no longer rely solely on automated mitigation — they need deep, real-time understanding of how their networks behave. This is where advanced operational intelligence tools — similar in purpose to Flow Assistant — are reshaping ISP cyber defense strategies. These tools give Network Operations Centers (NOCs), security teams, and engineers unprecedented visibility into traffic…


Large DDoS Attacks on an SMB customer

Full story On November 9th, 2025, at about 8:00 am, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 450 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 3 hours, with an increase in the peak volume of the attack to about 8 GB, 16 GB, and up to 23.4 GB, while the Packet Per Second traffic reached from about 800K up to 3.2M PPS. The attack protocols were UDP, ICMP,…


Large DDoS Attacks on an SMB customer

Full Story On October 5th, 2025, at about 10:30, alerts began to be received regarding the detection of attacks on the SMB’s customer IP address. The system identified an attack that included several vectors of attack, with a capacity of 280 Gbps of traffic that was blocked by FlowSec’s system. The attacks lasted for more than 5 hours, with an increase in the peak volume of the attack to about 6 GB, 10 GB, and up to 13.8 GB, while the Packet Per Second traffic reached from about 400K up to 1.3M PPS. The attack protocols were TCP (ACK, PSH)….


The Expanding Role of ISPs in Cyber Defense – And Why Customer Trust Now Depends on It

For years, Internet Service Providers (ISPs) were viewed primarily as connectivity providers — responsible for stable bandwidth, uptime, and network infrastructure. Cybersecurity was considered “someone else’s job”: enterprises installed firewalls, SMBs relied on basic antivirus tools, and cloud vendors offered optional add-on protections. But as modern cybersecurity threats grow more aggressive and complex, a fundamental shift is taking place: customers now expect their ISP to be a frontline security partner, not just a bandwidth supplier. This transformation did not happen overnight. A combination of evolving threats, market failures, and technological innovation has made the ISP’s role in cybersecurity not only…


DDoS & Cyberattack Surge – A Wake-Up Call for ISPs

What a 700% Cyberattack Surge Says About the Future of DDoS Defense Strategy for ISPs This past week, Israel Hayom (a major Israeli news outlet) reported a 700% increase in cyberattacks targeting Israeli networks, including a sharp rise in DDoS (Distributed Denial of Service) attacks, which aim to overwhelm and disable critical infrastructure and online services. Internet Service Providers (ISPs), Government websites, critical infrastructure, and many business customers all saw a dramatic spike. The volume alone raised alarms. But the bigger story is what this tells us about the evolving role of ISPs in national and global cybersecurity. A New…


The AI Arms Race in DDoS: Offensive vs. Defensive Strategies

Introduction In the evolving landscape of cybersecurity, the interplay between offensive and defensive Artificial Intelligence (AI) has become a focal point, including in Distributed Denial of Service (DDoS) attacks. Advanced AI adoption, such as the emerging Agentic AI, which create autonomous agents has the potential to escalate this “AI Warfare”, this post examines some of the offensive and defensive DDoS AI techniques and peeks into the potential future in which agentic AI is adopted by both sides. Offensive AI: Enhancing DDoS Attack Sophistication Cybercriminals are now leveraging AI to launch attacks with greater precision. Machine learning algorithms can analyze vast…


Innovation at the Edge: Niche Solutions for DDoS Protection

Introduction Distributed Denial of Service (DDoS) attacks are among the most persistent and evolving threats in the cybersecurity landscape. Leveraging massive traffic volumes to overwhelm networks, DDoS attacks can cause service disruptions, financial losses, and reputational damage. As attackers adopt sophisticated multi-vector strategies, traditional centralized security measures like rate limiting and IP blacklisting are no longer sufficient. This has given rise to edge security solutions that protect networks, applications, and data at their origin, closer to users and devices, ensuring operational continuity in a decentralized environment. The Shift Toward Edge Security Edge security focuses on safeguarding distributed environments such as…


Our Technology

Flowsec technology equips CSP/ ISP companies with advanced AI and real-time traffic analysis, delivering seamless DDoS protection and enabling effective customer defense while opening new revenue streams.


The Evolution of DDoS Attacks: From Nuisance to Major Threat

Remember when a website going down was just an inconvenience? Those days are long gone. Today’s Distributed Denial of Service (DDoS) attacks have evolved from minor disruptions into weapons capable of bringing entire organizations to their knees. Let’s explore this remarkable transformation and understand what it means for our digital future. The Birth of a Digital Threat In 1999, the University of Minnesota experienced something unprecedented: their computer systems were overwhelmed by a flood of traffic from multiple sources. This first documented DDoS attack, while primitive by today’s standards, marked the beginning of a new era in cybersecurity threats. Back…


Contact Us

Flowsec Ltd.

    Flowsec provides cutting-edge SaaS DDoS protection solutions for ISPs, CSPs, enterprises, MSSPs, and the national security sector. With multi-tenant and global shield technology, Flowsec enables communication service providers to offer advanced DDoS protection services to their customers.

    Accessibility Toolbar