main

Attack Types & VectorsSecurity

The Dyn Attack – One Year Later

October 19, 2017 — by Ron Winward1

dyn-one-year-later-960x640.jpg

One year ago, a threat actor launched a DDoS attack that disrupted service of some of the internet’s biggest names. The Mirai botnet had enslaved hundreds of thousands of IoT devices and was used to attack several entities, including the managed Domain Name System (DNS) provider Dyn.

The attack on Dyn was an event that many referred to as a wake-up call for internet security.

Except the industry, by and large, never really woke up.

Attack Types & VectorsSecurity

The Growth of DDoS-as-a-Service: Stresser Services

September 28, 2017 — by Daniel Smith0

stresser-services-960x640.jpg

The growth of DDoS-as-a-Service has resulted in a wide array of powerful and affordable DDoS services available to the public. Since the beginning of 2016, Radware’s ERT Research division has been monitoring a number of services available on both the clear and the darknet. These off-the-shelf attack services have been used to launch attacks on a number of industries including ISPs, media, financial service companies and online gaming. These services are commoditizing the art of hacking by making it possible for novices with no experience to launch large scale attacks.

Attack Types & VectorsSecurity

Do Hackers Have It Easy?

September 19, 2017 — by Shira Sagiv0

defense-pro-iot-960x540.jpg

Hackers got it easy. At least, it feels like it. They are in a growing “industry” with many, almost endless, targets to choose from. They have access to new tools and techniques, services that make it easy for them to launch an attack and lots of information and personal data at their fingertips. All of that is available today on the Darknet, and you don’t need to be a sophisticated hacker to get access and start “enjoying” it all.

Attack Types & VectorsDDoSSecuritySSL

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

September 12, 2017 — by Carl Herberger1

top-5-ddos-attacks-960x631.jpg

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion. Later, improvements in fortifications and armor led to castles and ironclad knights, until the invention of gunpowder made them obsolete. In the 20th century, fixed fortifications and trenches were rendered outdated by highly mobile armored forces. In all these examples, the common denominator is that one side’s tactical advantage spawned new ways of thinking among its opponents, eventually degrading that advantage or reversing it completely.

Attack Types & VectorsSecurity

So easy, a child can do it: 15% of Americans think a grade-schooler can hack a school

September 6, 2017 — by Radware0

students-hacking-schools-960x643.jpg

Yes, you read that right. When asked how easy they thought it would be for a student in grades 1-6 to hack a school, 15 percent of respondents said it was either somewhat easy (6 percent) or very easy (9 percent). The numbers rise with age. Some 57 percent think a high school student could easily hack a school, and 63 percent think an undergraduate would have no problem. These responses were part of a survey of 1,000 Americans conducted by SurveyMonkey on behalf of Radware.

Attack Types & VectorsSecurity

Hospital Stays Can Take Out More Than Your Organs

August 30, 2017 — by Louis Scialabba1

healthcare-mssp-960x620.jpg

The Cyber Theft Threat in Healthcare and how Service Providers can Transform Risk to Reward

You went to the hospital to get your appendix out and one week later your identity was taken from you as well.  How did this happen? In their 2017 Data Breach survey, Verizon found that ransomware has jumped up from the 22nd most common type of malware in 2014 to the 5th most common. The report also discovered that 72% of all healthcare attacks in 2016 were ransomware and the only industry targeted more than health care is financial services.

Attack Types & VectorsSecurity

Chatting With IoT Bots

August 1, 2017 — by Pascal Geenens0

chatting-with-iot-bots-960x720.jpg

After the Dyn attack by Mirai in October 2016, we knew we were facing an infliction point which would reshape the DDoS threat landscape for the coming months or years. The Internet of Things (IoT) would become an important part of that new landscape. After the attack, the inadequate security state of IoT and the unsophisticated nature of the botnets exploiting IoT devices such as IP cameras, DVRs and routers became apparent and the center of attention of many security researchers and reporters. IoT became the playground for many new bots and slowly turned into a battleground where bad bots, white-hat bots and vigilante bots are battling for ever-growing numbers of poorly designed and insecure devices.