Home Security Attack Types & Vectors

Attack Types & Vectors

Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made

Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase in complex encrypted attack...

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies - not only in advanced security...

Cyber Security Predictions for 2016

It’s fun to predict what may happen over a year in security.  The industry moves so fast and while some things do stay the...

Ways to Protect Against Modern Day Spear Phishing

Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on the rise.  The odd...

The Top 5 DDoS Attack Types We Saw in 2015

There were no “common” DDoS attacks in 2015.  The ones studied by Radware researchers were often volumetric; however, sophisticated, combined attacks such as Proton...

SSL Breaks Bad: A Protective Technology Turned Attack Vector

It’s an unfortunate reality that things meant to do good can and do get misused for harm. Consider the myriad stories around criminals using Google...

How Smoke Screen Cyber-Attacks Are Being Used in Data Breaches

2015 was a paramount year in data exfiltration. You may be familiar with many of the data breaches that were covered in the media...

SecureWorld 2015: Are Bots the Nemesis – Or Salvation to our Security Woes?

As a Platinum sponsor for SecureWorld 2015 events, we have discussed the need to quickly detect and mitigate security threats that are both automated...

What’s Lurking in Your CDN?

I was able to get to DerbyCon V this year for the first time - an annual conference founded by David Kennedy that is...

The Cloud Path – Rerouting Traffic in Peacetime Solves some Cyber-Attack Risk, Creates Others

Last month, I wrote about some inherent challenges with the increasingly popular cloud-only model for cyber-attack mitigation. As a reminder, I am not a...

DDoS Fire & Forget: PDoS – A Permanent Denial of Service

You no longer have to don an X-wing fighter or take a sledgehammer to a network to make the environment inoperable. A small, but...

Evolved Cyber-Attacks Target Banks and Mis-Direct Their Network Protection

For many years banks have been a prime target for cyber-attacks. As of late though, publicly-known cyber-attacks in the financial industry seem to have...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.