radware.customershome.com Open in urlscan Pro
2600:9000:2510:f400:1d:2038:a540:93a1  Public Scan

Submitted URL: https://prod.customershome.com/acchallenge/api/challenge-record/email-status/CLICKED/63F4BC83-AAE5-4E71-8720-416CA07A1037?redir...
Effective URL: https://radware.customershome.com/anonymous/challenge/63F4BC83-AAE5-4E71-8720-416CA07A1037?param=fromEmail&accessKey=4C5A6CD8-67AD...
Submission: On June 12 via manual from CA — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Jul 12, 2023
**CYBERSECURITY THREAT ALERT**

Radware identifies a growing trend in the ratio of DNS Flood attacks

over the last three quarters.

In recent analysis of the threat landscape Radware identified a concerning
trend: DNS Flood attacks are on the rise. These attacks pose a significant risk
to businesses, leading to potential revenue loss, damaged customer trust and
reputation.

Read the Alert