Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

February 21, 2026

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

February 21, 2026

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

February 21, 2026
Facebook X (Twitter) Instagram
Sunday, February 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Dramatic Escalation Frequency and Power of in DDoS Attacks
News

Dramatic Escalation Frequency and Power of in DDoS Attacks

Team-CWDBy Team-CWDFebruary 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The number of Distributed Denial-of-Service (DDoS) attacks has increased significantly and they’re getting more powerful and disruptive, analysis by cybersecurity researchers has warned.

The Radware 2026 Global Threat Analysis Report has detailed what is described as a “dramatic escalation in cyber-attack activity” during 2025, with a 168% increase in DDoS attacks compared with 2024.

The figure is based on analysis of Radware customer data. During 2025, the average Radware customer faced more than 25,351 attempted DDoS attacks during the reporting period – equivalent to 139 attempted incidents a day.

Technology, telecommunications and financial services were the most targeted sectors. According to Radware, the technology sector represented 45% of all network-layer DDoS attacks – an increase of almost 9% compared with the previous year.

“This growth was not an isolated event but an accelerating trend, with the attack frequency escalating to alarming levels,” the report warned.

“The changes observed are not merely incremental; they represent a new reality defined by unprecedented scale, algorithmic speed and a complete transformation of the underlying attack infrastructure.”

DDoS Attacks are Faster, Stronger and Harder to Stop

The average attack time for most common DDoS attacks – those which registered between 100 and 500Gbps – is just over ten hours. However, the most powerful DDoS now appear to be designed to hit hard and hit fast, with multi-terabit attacks which last an average of 35 minutes

The most high-impact web DDoS attacks now last less than 60 seconds, which makes them difficult to detect and defend against, because by the time the attack has occurred, it is already too late to stop it.

“The threat landscape continues to evolve with unprecedented speed and complexity,” said Pascal Geenans, vice president of threat intelligence at Radware.

While DDoS attacks have become more frequent and more powerful, the main driver behind the campaigns remains the same: Hacktivism.

The Radware report noted how the “persistent, high-volume threat” is sustained by a mature ecosystem which uses hundreds of Telegram channels to coordinate attacks and post about campaigns to amplify their visibility and impact.

During 2025, DDoS attacks impacted organizations around the world, but the three most targeted countries were Israel (12.2%), the US (9.4%) and Ukraine (8.9%).

Analysis of attacks suggested pro-Russian groups were responsible for the highest number of campaigns.

“This distribution underscores the role of hacktivism as a proxy weapon in international conflicts, used to disrupt the digital infrastructure of perceived state adversaries,” said Radware.

To defend against, automated, fast-moving modern DDoS attacks, the report recommended that organizations must become proactive in their cyber defence, with the ability to detect and protect against suspected DDoS campaigns before they happen.

“The critical question for 2026 is no longer about the persistence of the threat, but the agility of the response,” the report concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices
Next Article 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
Team-CWD
  • Website

Related Posts

News

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

February 21, 2026
News

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

February 21, 2026
News

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

February 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.