Home Security Attack Types & Vectors

Attack Types & Vectors

How to Respond to a DDoS Ransom Note

The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note.

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers.

Emotet Attacks Spread Alongside Fears of Coronavirus

Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.

Threat Alert: TCP Amplification Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection...

Empowering the Infosec Community

Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the "bad guys" are still a step ahead. Why? In large part, because of the power of community.

Ransomware: To Pay or Not To Pay?

Ransomware is a type of malware that restricts access to user data by encrypting an infected computer's files in exchange for payment to decrypt.

Behind the Disguise of Trojans

A Trojan horse is a malicious computer program masquerading as a useful or otherwise non-malicious, legitimate piece of software.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.