network background popup

Headless browsers: legitimate software that enables attack

Mark Teolis and Jag Bains give an account of what happens when malicious actors use headless browsers to facilitate a DDoS attack on a website and how it can be prevented in this piece on IT Pro Portal.

Click here to read the entire article.


DDoS Article Categories