Home Search

Mirai - search results

If you're not happy with the results, please do another search

2018 In Review: Memcache and Drupalgeddon

Attackers don't just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight...

2018 In Review: Schools Under Attack

As adoption of education technologies expanded in 2018, school networks were increasingly targeted by ransomware, data theft and denial of service attacks; the FBI...

Top 6 Threat Discoveries of 2018

Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below is a round-up of...

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks....

Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The...

Growing Your Business: Security as an Expectation

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear...

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IoT Botnets on the Rise

Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload delivery and began focusing...

Cities Paying Ransom: What Does It Mean for Taxpayers?

On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless....

IoT Attack Handbook

This handbook is a study of the original Mirai attack vectors and some of its variants. Each of the attacks is dissected in a lab environment, allowing the reader to discover the flexibility of each one.