
Explore The Next Frontier in Cyber Threats and Defense Evolution!
Download ebookAt CrowdSec, we like challenges. And one of them is high logs volume processing to protect web infrastructures with larger traffic. In this article, we will see how to achieve high performance in log processing and push limits with horizontal scaling.
As CrowdSec is approaching its second anniversary, our community is stronger than ever and increasing at an exponential rate. We reached a point where each day more than 1 million signals – data on nefarious IP activity – is shared with CrowdSec, contributing to the biggest Cyber Threat Intelligence in the world. With 1.8 million […]
A short while ago, we sat down with Yannick Siegler, one of CrowdSec’s early spotters and most involved community member. Hi Yannick. Can you tell us a little bit more about yourself and your company? I have been an auto-entrepreneur for several years. I run my own company, Siegler Informatique, offering managed services and VPS. […]
Distributed Denial-of-service (DDoS) attacks have been targeting all types of businesses over the past few years. They have been used by hackers for quite some time and are some of the most common attacks but remain extremely efficient and harmful. The concept is simple: hackers hammer a given target from many different locations to take […]
Did you know that every day across the Internet, each IP address is scanned hundreds of times? Or that more than 2,000 attacks are perpetrated, stealing 1.4 million personal records? That’s right, every single day! Companies, institutions, individuals are more aware of the issue than they used to be and are ready to deal with […]
The tale of two towers There are two schools in Open source. The first one considers that pure open source should be free with no exception and that developers shouldn’t live from it but rather willingly spend their time on their art. Even though this might sound like a monk-oriented career, a lot was done […]
In 2020, our ways of living and working turned completely upside down in a matter of days. We all brought our companies home and staying connected to our colleagues, friends and family became a critical necessity. This opened the door for hackers to cause disruption and we saw a huge increase of DDoS attacks all […]