Home Security Attack Types & Vectors

Attack Types & Vectors

The Origin of Ransomware and Its Impact on Businesses

In previous articles we've mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll...

IoT Botnets on the Rise

Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload delivery and began focusing...

The Evolution of IoT Attacks

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over...

Free DNS Resolver Services and Data Mining

Why would companies offer free DNS recursive servers? DNS data is extremely valuable for threat intelligence. If a company runs a recursive DNS for...

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by...

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to...

Can SNMP (Still) Be Used to Detect DDoS Attacks?

SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component in many networks for...

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will...

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are...

What Should You Do When Your Identity Has Been Compromised?

Almost every day, someone calls me to inquire about how to deal with a compromised identity. It has become so common that I have...

Micropsia Malware

Since June 2018, the Radware Threat Research team has monitored an ongoing APT against the Palestinian authority, featuring an updated version of the Micropsia...

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.