What exactly is the Heartbleed vulnerability?
On April 7, 2014, the OpenSSL community announced that it found a critical vulnerability in the TLS Heartbeat protocol. The nature of such an attack is very similar to a buffer overflow attack, where a remote attacker can exploit the protocol by sending a malformed “heartbeat” request with a payload size bigger than the actual request. In response, the vulnerable server would return a heartbeat response that contains a memory block of up to 64KB in the payload. This memory block can potentially reveal confidential information, including SSL private keys, user passwords and more. The researchers that found this vulnerability have put together an informative micro site that explains all of this.read more
Windows XP support has ended and there will be no more patches.
This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer receive automatic security updates or protection against new viruses. This means that the 12 year-old system could leave behind security holes for users who haven’t upgraded.read more
As you’ve most likely heard, a very serious threat called CVE-2014-0160, commonly referred to as “Heartbleed” has been threatening the ultra-popular open-source OpenSSL package. Heartbleed is unique in the collateral damage it can create.
Heartbleed exposes the ugly side of open-source security components: In past events, where such Earth-shaking vulnerabilities were found, there was a vendor that would pay for the collateral damages that the vulnerability created. Who would pay for the collateral damages of this open-source vulnerability? It is likely be the users that are using OpenSSL.read more
Every day at Radware we have customers and prospects asking us about the key determinants in sourcing and testing a DDoS protection service.read more
Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm. The new kid on this attack block is NTP. NTP, or Network Time Protocol, is an amplification attack that is an emerging form of DDoS. This attack relies on the use of publically accessible NTP servers to overwhelm a victim’s system. While DNS attacks are still an old favorite, recently there has been a new rash of HTTP-based amplification attacks having a more significant impact than the past standard network floods.read more
The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention. It was also recently revealed that the cyber attacks on the NATO websites and infrastructure have been linked to those same tensions. The attacks, which targeted NATO and also Ukrainian media websites, were distributed denial-of-service attacks (DDoS) allegedly by the pro-Russia group Cyber Berkut (KiberBerkut).read more