Recent Articles

Content distribution Network

Five Benefits of Integrating Bot Management with Your CDN

CDNs have proven to be the best option for enterprises and other organizations that need to provide Web content and services quickly and efficiently to their customers.
Threat Alert

Log4Shell: Critical log4j Vulnerability

The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library
Online Gaming

Radware Threat Researchers Live: Ep.16

Special guest Mathieu Huysman, share about online game hacking with our hosts Pascal Geenens and Daniel Smith.

DDOS Attacks Targeting Payment Services of Global Financial Institutions

A threat actor or group is actively targeting the online services of branches of global financial institutions
Ransomware

Ransomware & Ransom DoS, Why They Are Similar But Different

While ransomware and ransom DoS have a common objective their techniques are different, and so is the threat impact for organizations. 
ddos protection

Does Your DDoS Protection Solution Defend Against the Latest Attacks? 

Enterprises must ensure that vendors are capable of defending its network & applications from the latest DDoS burst and multi-vector attacks. 
cloud security

4 Common Cloud Vulnerabilities Which Lead to a Breach

As more organizations adopt multi-cloud and hybrid cloud strategies, additional challenges and threat vectors are added.
Hacking Back

Are Offensive Cyber Campaigns Gaining Traction?

In the last year alone, Ransomware attacks have surged, and we have already seen more DDoS attacks at this point in the year than all of 2020.
ransomware

Ransom DDoS, a Scenario Straight Out of Hollywood

When it comes to ransom DDoS attacks there is only one question you should ask yourself. Are you ready? Readiness is the only way to avoid being impacted.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.