Introducing Go-MMProxy: a Layer-3 Solution

Introducing Go-MMProxy: a Layer-3 Solution

In this latest blog post, we will be exploring the work that has been done by Path’s talented and dedicated engineers. We introduce a Go-based proxy tool.
UDP Amplification Attacks and the Necessity of Mitigation: Case Study on CableBahamas

UDP Amplification Attacks and the Necessity of Mitigation: Case Study on CableBahamas

During a recent weeks-long network duress period, Cable Bahamas contacted a DDoS mitigation firm to assist in finding a solution to their pressing issues. Issues such as being attacked daily and weekly by heavy DDoS attacks and more specifically UDP amplification attacks.
Competency, Mitigation, and the Value of Time: Network Attack Case Study on CoinPayments.net

Competency, Mitigation, and the Value of Time: Network Attack Case Study on CoinPayments.net

What follows is a summary by Path’s Emergency Response Team as experienced from the front lines. It describes the attack on CoinPayments in detail, how it was remedied, and pertinent discussion.
Decentralization, Deregulation, and Blockchain Technology: Externalities of Policy

Decentralization, Deregulation, and Blockchain Technology: Externalities of Policy

We discuss policy effects on network-dependent technology companies.
On Monitoring Uncontrollable Networks

On Monitoring Uncontrollable Networks

A discussion on monitoring networks you cannot control.