Oct. 10, 2023, 12:02 p.m. | Julien Desgats http://blog.cloudflare.com/author/julien-desgats/

The Cloudflare Blog blog.cloudflare.com

This post dives into the details of the HTTP/2 protocol, the feature that attackers exploited to generate the massive Rapid Reset attacks, and the mitigation strategies we took to ensure all our customers are protected

2 rapid reset attack attackers attacks breaking customers ddos exploited feature http mitigation protocol rapid rapid reset record reset security strategies the record trends vulnerabilities

More from blog.cloudflare.com / The Cloudflare Blog

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States