Introducing Go-MMProxy: a Layer-3 Solution

Introducing Go-MMProxy: a Layer-3 Solution

In this latest blog post, we will be exploring the work that has been done by Path’s talented and dedicated engineers. We introduce a Go-based proxy tool.
UDP Amplification Attacks and the Necessity of Mitigation: Case Study on CableBahamas

UDP Amplification Attacks and the Necessity of Mitigation: Case Study on CableBahamas

During a recent weeks-long network duress period, Cable Bahamas contacted a DDoS mitigation firm to assist in finding a solution to their pressing issues. Issues such as being attacked daily and weekly by heavy DDoS attacks and more specifically UDP amplification attacks.
Competency, Mitigation, and the Value of Time: Network Attack Case Study on CoinPayments.net

Competency, Mitigation, and the Value of Time: Network Attack Case Study on CoinPayments.net

What follows is a summary by Path’s Emergency Response Team as experienced from the front lines. It describes the attack on CoinPayments in detail, how it was remedied, and pertinent discussion.
Path Secures over $1M in Seed Funding

Path Secures over $1M in Seed Funding

Path Network, Inc. has secured seed funding in excess of $1M USD, further bolstering capacity for mitigation services worldwide and for expanding into the European and APAC regions.
eBPF, XDP and Network Security

eBPF, XDP and Network Security

At Path, we aren’t afraid of breaking things and moving fast. We have fostered a strong engineering culture which encourages innovation and we believe that this important, as it enables our team members to do their best.One of the latest innovations from within the Path engineering team is
Fuzzing CS:GO BSP Files

Fuzzing CS:GO BSP Files

We fuzzed BSP map files for Counter Strike: Global Offensive leading to the discovery of a stack-based buffer overflow. Through some reverse engineering and source code analysis, we discovered that the vulnerability can lead to remote code execution.