{"version":"1.0","provider_name":"Information Security Blog - 7Security","provider_url":"https:\/\/www.7sec.com\/blog","author_name":"madmin","author_url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/","title":"Fight Back with DDoS Mitigation - Information Security Blog - 7Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"peUPI4VxaF\"><a href=\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\">Fight Back with DDoS Mitigation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/embed\/#?secret=peUPI4VxaF\" width=\"600\" height=\"338\" title=\"&#8220;Fight Back with DDoS Mitigation&#8221; &#8212; Information Security Blog - 7Security\" data-secret=\"peUPI4VxaF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.7sec.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Have you ever experienced having a server being overloaded by incoming traffic, or how would we call it \u2013 a denial of service? It\u2019s one of the most common cyber attacks and it aims to shut down one\u2019s online systems. DDoS (Distributed Denial of Service) is an attack on the computer system aiming at bringing &hellip; Continue reading \"\"","thumbnail_url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png"}