Home Security Attack Types & Vectors

Attack Types & Vectors

Early Attack Activity Forcing New Thinking in Healthcare IT/Security

Every year when we conduct our survey for the Global Application & Network Security Report, one of the more interesting things to observe is...

Threat Alert: Bitcoin Exchanges and Websites Experiencing DDoS Attacks

Over the last several months, our ERT Research team has noticed a growing trend of attackers targeting Bitcoin exchanges and websites that deal with...

A View from the Corner Offices: New Research on C-Suite Security Mindset

The role of the modern information security executive is, in many ways, an unenviable position. The continuous pressure to protect increasingly sensitive data and...

Here are the specific ways the 2016 Republican National Convention (RNC) and Democratic National Convention (DNC) will be Cyber-Attacked

Major Attack Type: Denial of Service Attacks Denial of Service (DoS) attacks have grown each and every year since 2010. Moreover, the lessons of what...

Aviation Accidents: Many Risks Move from Mechanical Failures to Terrorism. Are Cyber-Attacks Next?

EgyptAir’s 20 Year Terror History: Some quick thoughts on the most recent loss of EgyptAir’s flight 804 and how persistent terror has been one of...

The Rise of Smartphone BotNets

Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is constantly targeted by attackers...

Is Your Data Secure From Hackers?

Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Transport Layer Security (TLS)...

Cyber Attack Market Place

Last month, I gave an introduction to the Darknet. In this blog, I’d like to talk specifically about what an attacker can purchase,...

Your Risk Checklist to Protect Against Online Business Cybersecurity Threats

Last month, we took a look at how the transformation of businesses of all sizes and in nearly all industries towards online operations has...

Hacktivists Using SQL Injections to Target Government Data

Over the last year, hacktivists driven by ideological differences have targeted government data around the world at a persistent rate. The lines are blurred...

Ransom, Ransom Everywhere

DDoS for Ransom is a growing concern. In the past year, we have witnessed an exponential increase in the number of ransom threats companies...

You’ve Been Clickjacked!

So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting,...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.