The Millennial View on Data Security

This report explores how UK millennials view cybersecurity, how they would react if their data was compromised and what it means for businesses today.

IoT Attack Handbook

This handbook is a study of the original Mirai attack vectors and some of its variants. Each of the attacks is dissected in a lab environment, allowing the reader to discover the flexibility of each one.

Consumer Sentiments: Cybersecurity, Personal Data and the Impact on Customer Loyalty

This report details how consumers view cybersecurity, their reaction if their data was compromised and how it impacts today’s leading organizations.

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are...

Top 9 DDoS Threats To Prepare For

Now more than ever, it’s critical that your DDoS mitigation solution protect your organization and customers from today's and tomorrow's most sophisticated attacks.

C-Suite Perspectives 2018

This report details the global cybersecurity trends that are top of mind for senior executives.

The Executive Guide to Demystify Cybersecurity

WHAT DO BANKS AND CYBERSECURITY HAVE IN COMMON? EVERYTHING The world we live in can be a dangerous place, both physically and digitally. Our growing...

Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s cloud malware protection service detected a zero-day malware threat at one...

The Mikrotik RouterOS-Based Botnet

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world...

A Quick History of IoT Botnets

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such...