Home Security Attack Types & Vectors

Attack Types & Vectors

What Does the Volkswagen Hack mean for IoT Security?

A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts of a car’s systems. ...

Portmapper is Preying on Misconfigured Servers to Amplify Attacks

In the constantly evolving threat landscape attackers are always finding new ways to target their victims. In the last few years we have seen...

How the German Government’s Network Was Breached – And Why It Could Happen To You

The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown amounts of data and...

How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions

The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute...

Reverse Engineering a Sophisticated DDoS Attack Bot

Not long ago, the Radware Emergency Response Team (ERT) noticed significant and increased usage of the Tsunami SYN Flood attack against a large customer....

DDoS-For-Hire: A Full Blown Market

DDoS-for-hire has been around for a while.  Until recently, “booters” were known as paid online services used by gamers to initiate DDoS attacks against...

Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks

Modern cyberattacks are sophisticated and are often launched over long periods of time.  The complexity of these attack campaigns can result in attack detection...

Can a CDN Stop Cyber-Attacks?

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.