Home Security Application Security

Application Security

Why Low & Slow DDoS Application Attacks are Difficult to Mitigate

The naïve and still common perception of DoS/DDoS attacks is that to be destructive, attacks must use brute force and generate massive traffic. Low...

ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect

AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack is scheduled for May...

WordPress Sites Exploited Through Brute Force: 3 Simple Ways to Protect Yourself from the Attack

During the past week we noticed an abnormal increase of brute force attacks targeting WordPress applications. The attacks use automated scripts that attempt to login...

DefenseFlow: The First Ever SDN Application That Programs Networks for DoS/DDoS Security

Radware has announced its comprehensive SDN strategy and has introduced its first SDN Application: DefenseFlow™. Why is the DefenseFlow™ release so exciting? SDN is all...

Stock Exchanges in the Line of Fire

During last week's RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire - Morphology of Cyber...

Security: On-Premise or In the Cloud? Radware’s DefensePipe Offers an End-to-End Solution

While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud. Now, you can stop...

When Servers Attack Your Bank: The Rise of Server Botnets

Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing...

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

New Attack Trends – Are You Bringing a Knife to the Gunfight?

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts - the Emergency Response Team (ERT)...

ERT Threat Alert – New Trojan Found: Admin.HLP Attacks Organization Data

Radware’s Emergency Response Team (ERT) research Lab released a threat alert regarding a newly discovered Trojan Key Logger named Admin.HLP that was detected today for the first time within one of its customer’s servers.

Admin.HLP, is malicious software that monitors keystrokes on the victim’s computer, collects user passwords, credit card numbers and other sensitive information. Then it sends all the stolen data out of the organization to the attackers’ remote servers over secured HTTPS connection.

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

If you've been waiting, now's the time to participate - the last week of Radware's Attack Mitigation Black Belt Challenge begins today and ends...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.