By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat | HackerNoon
Computing

Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat | HackerNoon

News Room
Last updated: 2026/03/03 at 1:43 AM
News Room Published 3 March 2026
Share
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat | HackerNoon
SHARE

Frankfurt am Main, Germany, March 2nd, 2026, CyberNewswire

  • 12,388 minutes of continuous attacks – more than eight days straight
  • 509 terabytes of cumulative attack volume
  • 70% of companies targeted in an initial attack are hit again

Link11 has published its European Cyber Report 2026, revealing that DDoS attacks reached a new level in 2025 and have become a permanent stress factor for digital infrastructures.

The report shows that the number of documented attacks in the Link11 network rose by 75% in 2025, following explosive growth in the previous year (+137%). This establishes DDoS attacks as a permanent structural burden for companies and critical infrastructures in Europe.

Record values: Terabit attacks have become common. While a single 1.4 Tbit/s attack was considered exceptional in 2024, three attacks surpassing 1 Tbit/s were recorded in 2025. The strongest attack measured was 1.33 Tbit/s, with over 120 million packets per second.

A coordinated series of attacks totaled 509 terabytes of data. This corresponds to the daily data traffic of a medium-sized city of around 120,000 people, or over 170,000 hours of HD video streaming.

From Short Peaks to Continuous Load

The increase in the duration of attacks is particularly alarming. The longest recorded attack lasted 12,388 minutes – over eight days straight. In 2025, active DDoS attacks were observed 88% of the time. This equates to 322 days per year when systems in the Link11 network were targeted by attacks. This effectively makes the state of emergency the norm.

At the same time, attack dynamics are changing. There is a greater than 70% probability that an initial attack will be followed by at least one additional attack. On average, 2.8 follow-up attacks were recorded after an initial incident – an 80% increase compared to the previous year.

“We are experiencing a clear paradigm shift. DDoS is no longer a disruptive one-off event but rather a permanent strategic burden on digital business models,” says Jens-Philipp Jung, founder and CEO of Link11. “Those who only react when an attack occurs have already lost. Resilience must be permanent, automated, and architecturally anchored.”

New attack tactics: a hybrid of volume, endurance, and precision

In addition to massive bandwidth, analysts have observed a strategic combination of high-volume attacks and long-lasting, low-and-slow scenarios. Attackers systematically test protective mechanisms, vary patterns in real time, and increasingly shift their activities to the application level.

“It’s not just the size of an attack that matters anymore, but also its endurance and adaptability,” Jung continues. “Modern DDoS campaigns combine extreme bandwidth with tactical patience. That is exactly what makes them so dangerous.”

Rethinking resilience: Combining infrastructure and application levels

The report’s findings make it clear that DDoS attacks are not just a technical problem anymore. These attacks directly impact revenue, reputation, SLA commitments, and regulatory requirements.

Therefore, in addition to powerful, always-on DDoS protection, protecting web applications and APIs is becoming strategically important. Modern attacks increasingly target Layer 7, imitate legitimate traffic, and cause gradual performance degradation without triggering classic alarm thresholds. Web Application & API Protection (WAAP) is a key recommendation: digital business processes can only be operated in a permanently stable and predictable manner through a combination of network protection, behavior-based analysis at the application level, and AI-supported bot detection.

Companies should take a holistic approach to their security architecture.

  • Always-on DDoS protection instead of reactive emergency measures

  • WAAP solutions to secure web applications and APIs

  • Automated, AI-powered detection and mitigation

Integration of DDoS scenarios into business continuity and crisis plans

“Digital availability is a competitive factor today,” says Jung. “Cyber resilience determines whether business models can withstand constant technological, operational, and geopolitical attacks.”

About Link11

Link11 is a specialized European IT security provider that protects global infrastructures and web applications from cyberattacks. Its cloud-based IT security solutions help companies worldwide strengthen the cyber resilience of their networks and critical applications and avoid business interruptions. Link11 is a BSI-qualified provider of DDoS protection for critical infrastructure. With PCI-DSS, SOC2 Type 2, C5, and ISO-27001 certifications, the company meets the highest standards in data security.

Contact

Lisa Froehlich

Link11 GmbH

[email protected]

:::tip
This story was published as a press release by Cybernewswire under HackerNoon’s Business Blogging Program

:::

Disclaimer:

This article is for informational purposes only and does not constitute investment advice. Cryptocurrencies are speculative, complex, and involve high risks. This can mean high prices volatility and potential loss of your initial investment. You should consider your financial situation, investment purposes, and consult with a financial advisor before making any investment decisions. The HackerNoon editorial team has only verified the story for grammatical accuracy and does not endorse or guarantee the accuracy, reliability, or completeness of the information stated in this article. #DYOR

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Beyond computing power: How TECNO is moving AI imaging from color to culture Beyond computing power: How TECNO is moving AI imaging from color to culture
Next Article 5 Major OLED Monitor Brands That Actually Offer Burn-In Protection – BGR 5 Major OLED Monitor Brands That Actually Offer Burn-In Protection – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Stellantis reportedly in talks with Leapmotor over Canada EV plant · TechNode
Stellantis reportedly in talks with Leapmotor over Canada EV plant · TechNode
Computing
Apple Just Made Its Best Monitor Cheaper – BGR
Apple Just Made Its Best Monitor Cheaper – BGR
News
Everything You Need to Know About Meta Verified |
Everything You Need to Know About Meta Verified |
Computing
Sorry everyone, but you need to stop copying Apple already
Sorry everyone, but you need to stop copying Apple already
News

You Might also Like

Stellantis reportedly in talks with Leapmotor over Canada EV plant · TechNode
Computing

Stellantis reportedly in talks with Leapmotor over Canada EV plant · TechNode

1 Min Read
Everything You Need to Know About Meta Verified |
Computing

Everything You Need to Know About Meta Verified |

5 Min Read
How to Install and Use OpenAI’s Codex Plugin Inside Claude Code: Complete Setup Tutorial – Chat GPT AI Hub
Computing

How to Install and Use OpenAI’s Codex Plugin Inside Claude Code: Complete Setup Tutorial – Chat GPT AI Hub

11 Min Read
The Cybersecurity Value Chain: How 25 Companies Fill 72 Foundational Roles | HackerNoon
Computing

The Cybersecurity Value Chain: How 25 Companies Fill 72 Foundational Roles | HackerNoon

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?