threatpost.com
Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack
Why many attack techniques can be reused – but organizations can't defend against them. We look at some likely attack vectors for the next 12 months, and analyze some of the most recent and successful adversarial groups, and the types of attacks they deployed for maximum impact.