Cyber attacks have been a constant thorn in the side to every IT professional since the dawn of the internet age. As technology has progressed within IT departments to bolster their defenses, the technology has also progressed within the hacking community with many new and dangerous tools being used in attacks in the last couple of years.
Packet floods, large-scale DDoS attacks, bots, and browser impersonations are just a small sample of what the new-age hackers are using these days. With such a changing landscape and weapons being produced by both sides in this “war,” it is a war that’s ever-present and dynamic in its scope.