Home Security Attack Types & Vectors

Attack Types & Vectors

Cybersecurity in the Real World: 4 Examples of the Rise of Public Transportation Systems Threats

Public Transportation is the lifeblood of any economy and the circulatory system of modern day societies.  From train, plane to automobile,...

Ransomware Takes Center Stage As A Major Corporate Cyber Security Risk

It’s 9:30am.  You’ve gotten your morning coffee, checked your email, and now you are surfing the web when all of a sudden...

Sustained Vigilance Key for Financial Services Organizations in Light of Stable, Steady Threat Landscape

Every year when we publish our Global Application & Network Security Report, one of the most popular aspects of the report is what we...

The Stages of Online Business Transformation Come With Benefits… and Risks

As a father of teenaged children, I sometime marvel at the level of network-connectedness of that younger generation. It is fair to say...

Shades of Grey: The Good, The Bad, and The Ugly Side of Web Scraping

Webscraping, data mining, cookieing… these are just some of the many tactics used by businesses to collect information from other websites for...

How to Prepare for a DDoS Attack

Our 2015-2016 Global Network & Application Security Report documented that 51% of businesses suffered a DDoS attack in 2015.  Further, 90% of businesses suffered...

At Risk for DDoS Outages? If You Answer Yes to the First Five Questions – WATCH OUT!

We've all seen executives boast after a high profile cyberattack outage that they have done all that they can do when it comes to...

Today’s Cyber Security Threats in the Telecom Industry

Today the Telecom industries provide a wide array of global services that communicate with millions of customers. This diverse business ecosystem is fraught with increasingly...

Cyber Attack Marketplace: Where, How, and Why of Purchasing an Attack

Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at...

When Trends Collide – Ransomware and IoT Attacks Continue

A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we work closely with a...

Could Your Network Survive APDoS or Hit-and-Run DDoS?

Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip my answer was simple:  “Sure!...

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.