Threat actors abuse protocol 33 in an attempt to bypass defenses focused on traditional TCP and UDP traffic flows, says @Akamai’s Tom Emmons. Read more. @techradar #DDoS #cybersecurity https://t.co/PbwjTaVNE9 https://t.co/tE9HWZ2iVv
Subscribe for the latest news: