Home Security Attack Types & Vectors

Attack Types & Vectors

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This...

Anatomy of a Cloud-Native Data Breach

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a...

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not,...

What is a Zero-Day Attack?

Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature. Security systems...

CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats

According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While ‘good’ bots discreetly index...

Bots 101: This is Why We Can’t Have Nice Things

In our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I...

Adapting Application Security to the New World of Bots

In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported in 2017, this uptick...

IoT Expands the Botnet Universe

In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because IoT devices are always-on,...

Attackers Are Leveraging Automation

Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven to be the catalyst...

The Rise in Cryptomining

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals,...

5 Ways Malware Defeats Cyber Defenses & What You Can Do About It

Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach,...

Top 3 Cyberattacks Targeting Proxy Servers

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...