Home Security Attack Types & Vectors

Attack Types & Vectors

How the German Government’s Network Was Breached – And Why It Could Happen To You

The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown amounts of data and...

How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions

The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute...

Reverse Engineering a Sophisticated DDoS Attack Bot

Not long ago, the Radware Emergency Response Team (ERT) noticed significant and increased usage of the Tsunami SYN Flood attack against a large customer....

DDoS-For-Hire: A Full Blown Market

DDoS-for-hire has been around for a while.  Until recently, “booters” were known as paid online services used by gamers to initiate DDoS attacks against...

Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks

Modern cyberattacks are sophisticated and are often launched over long periods of time.  The complexity of these attack campaigns can result in attack detection...

Can a CDN Stop Cyber-Attacks?

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.