ddos Attacks & Data Breaches

15 data breaches have involved ddos as the primary attack method or incident type. Distributed denial of service (DDoS) attacks overwhelm systems with traffic to disrupt availability. While primarily a disruption technique, DDoS can mask data theft or enable other attacks.

Impact: DDoS causes service outages, revenue loss, and reputational damage. Attacks may target specific applications or entire networks.

Prevention: DDoS mitigation services, content delivery networks (CDN), traffic analysis, and capacity planning provide protection.

Understanding how ddos attacks occur helps security teams prioritize defenses and incident response capabilities. Compare with other attack types like Ransomware, Phishing, or Supply Chain attacks. View the latest breaches across all incident types.

Classification: Incidents are categorized by the primary attack vector or root cause identified in breach disclosures and security research.
15
ddos Incidents
Date Company Type Industry Country Severity Source
Jun 30, 2025 Citrix (NetScaler ADC and Gateway) ddos Technology - 5/10 View
Oct 10, 2023 IETF (HTTP/2) ddos Technology - 5/10 View
Mar 30, 2023 Microsoft (Internet Explorer) ddos Technology - 5/10 View
Mar 28, 2022 Microsoft (Edge) ddos Technology - 5/10 View
Mar 25, 2022 Arcserve (Unified Data Protection (UDP)) ddos Technology - 5/10 View
Mar 25, 2022 Mitel (MiCollab, MiVoice Business Expres... ddos Technology - 5/10 View
Mar 3, 2022 Cisco (IOS, XR, and XE Software) ddos Technology - 5/10 View
Mar 3, 2022 Cisco (IOS XE Software) ddos Technology - 5/10 View
Mar 3, 2022 Cisco (IOS and IOS XE Software) ddos Technology - 5/10 View
Mar 3, 2022 Siemens (SIMATIC CP) ddos Technology - 5/10 View
Mar 3, 2022 Microsoft (PowerPoint) ddos Technology - 5/10 View
Mar 3, 2022 Cisco (Catalyst 6800 Series Switches) ddos Technology - 5/10 View
Mar 3, 2022 Cisco (Small Business RV160, RV260, RV34... ddos Technology - 5/10 View
Mar 11, 2016 Staminus ddos - - 6/10 View
Jan 16, 2015 Lizard Squad ddos - - 6/10 View

Unlock Full Breach Intelligence

Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.

Full historical archive API access Real-time alerts Threat actor data Export to CSV/JSON

Contact access@breachsignal.com for enterprise pricing.