main

DDoS AttacksHTTP Flood AttacksSecurity

Much more than Outage: 2013 DDoS Market Review

January 27, 2014 — by Motty Alon1

What comes to mind when the term “Denial of Service” is mentioned? Probably website outage.

This image has been crafted over the last couple of years with media, analysts and bloggers all talking about Denial of Service attacks, but mostly when the result of the DoS attack caused a site outage. Our latest report, the Radware Global Application and Network Security Report addresses this and other misconceptions about DDoS.

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack

August 9, 2013 — by Jon Garside0

Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning to their normal lives with new ideas and newfound fears. My colleagues will be reporting on their findings, but I wanted to just touch on a few highlights of the conference, some sadness and talk about the value of research.

Application SecurityAttack MitigationDDoS AttacksHTTP Flood AttacksSecurity

Stock Exchanges in the Line of Fire

March 6, 2013 — by Ziv Gadot0

During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks." Based predominantly on my experience as part of Radware’s Emergency Response Team (ERT) that provides 24/7 DDoS attack mitigation support, I focused on three specific topics:

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

February 8, 2013 — by Ron Meyran0

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksSecurity

Shooting From Behind the Fence

February 8, 2013 — by Eyal Benishti0

Can You Stay Anonymous While Participating in a DDoS Attack?
Taking part in a Hacktivist group is completely different than being part of a Botnet. In a Botnet, case participants are unknowingly “recruited” to an attack. In the Hacktivist group, case members take part in attack activities on their own accord.
Just this past month, Anonymous hackers in London were jailed for a series of DDoS attacks on PayPal and other payment services such as Visa and MasterCard.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

New Attack Trends – Are You Bringing a Knife to the Gunfight?

January 22, 2013 — by Ziv Gadot0

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts – the Emergency Response Team (ERT) – who’ve seen their fair share of cyber attacks while actively monitoring and mitigating attacks in real-time. In this year’s annual report, our experts have uncovered several new trends in cyber-security worthy of a closer look.

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

ERT Threat Alert: Olympic Security Update

July 30, 2012 — by Matan Atad0

Radware’s Emergency Response Team (ERT) releases a new threat alert regarding an upcoming DDoS attack targeting websites linked to the 2012 Summer Olympics.

Attacker Background

An event with the magnitude of the Summer Olympics is a likely target for many threats, including IT security attacks.  Radware Security researchers have found that the Olympic Games website is on the radar of hackers who published an HOIC booster script on pastebin. The time or sizes of potential attacks are unknown. Additionally, we’ve identified two companies’ URLs that were found on HOIC booster scripts in the last 24 hrs. Presumably, this means that two companies could be targeted for future attacks. Others may be targeted as well.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecurity VirtualizationSEIMWeb Application Firewall

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

July 16, 2012 — by Carl Herberger0

If you’ve been waiting, now’s the time to participate – the last week of Radware’s Attack Mitigation Black Belt Challenge begins today and ends this week. And what a challenge it is! More and more people are participating each week and the leader board has changed hands a number of times – with the standing after the Red Belt challenge resulting in a tie for first place!

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecurity VirtualizationSEIMWeb Application Firewall

Calling All Attack Mitigation Experts – Red Belt Round Begins Today!

July 9, 2012 — by Carl Herberger0

Two more weeks left in the Attack Mitigation Black Belt Challenge and congratulations to all who have earned a green belt. As we head into the next round of progressively difficult questions, we have a fierce competition for the Champion. “Brewer” is giving “dh” a run for the money, with only one second separating these first and second place contenders. Check out the Leader Board for the rankings.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

Are you ready for your Green Belt in Attack Mitigation?

July 2, 2012 — by Carl Herberger0

Knowledge Test Overview

Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition.

People from all over the world are participating in Radware’s first Attack Mitigation Black Belt Challenge and only seven seconds separates the current leader, “dh”, from the fifth place position. It is apparent that some questions were stumbling blocks as we had two questions in the Yellow Belt round that only 10% of the participants could answer properly.