When You Get Breached, So Do Your Customers
No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers.
No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers.
Recent cyber events have proven why Anonymous is obsolete, highlighting the need for a new hacktivist group that doesn’t live off the names of the past.
The COVID-19 crisis offers no reprieve from cybercriminals, who are using this crisis as an opportunity to attack critical infrastructure.
The online gaming industry experiences peak engagement & sales during the holiday season. Along with peak traffic comes a lot of unwelcome bot traffic.
Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.
In-house bot management solutions struggle to understand distinctive user behavior, and result in false positives and negatives.
How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into their security strategies now to take advantage of the technology’s ability to detect and mitigate attacks that incorporate the same capabilities? Pascal Geenens, Radware’s EMEA security evangelist, weighs in. What is […]
Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The geographic spread of vulnerable servers and the targets of the attacks is global and concentrated in regions with high cloud data center densities Motivations behind the exploits range from planting Linux backdoors, […]
Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate.
The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These devices feature sensors and an IP address for Internet connectivity, enabling these objects to collect and exchange […]
It’s difficult to have missed the headlines on the new IoT botnet threat that is forming and the storm that might come with it. Why is the world under the spell of this new threat? What makes it different from Mirai? Why could it potentially become the most threatening botnet ever seen?
After the Dyn attack by Mirai in October 2016, we knew we were facing an infliction point which would reshape the DDoS threat landscape for the coming months or years. The Internet of Things (IoT) would become an important part of that new landscape. After the attack, the inadequate security state of IoT and the […]
Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.