Home Security Attack Types & Vectors

Attack Types & Vectors

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks....

Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The...

The Origin of Ransomware and Its Impact on Businesses

In previous articles we've mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll...

IoT Botnets on the Rise

Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload delivery and began focusing...

The Evolution of IoT Attacks

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over...

Free DNS Resolver Services and Data Mining

Why would companies offer free DNS recursive servers? DNS data is extremely valuable for threat intelligence. If a company runs a recursive DNS for...

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by...

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to...

Can SNMP (Still) Be Used to Detect DDoS Attacks?

SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component in many networks for...

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will...

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are...

What Should You Do When Your Identity Has Been Compromised?

Almost every day, someone calls me to inquire about how to deal with a compromised identity. It has become so common that I have...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.