Home Security Attack Types & Vectors

Attack Types & Vectors

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will...

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are...

What Should You Do When Your Identity Has Been Compromised?

Almost every day, someone calls me to inquire about how to deal with a compromised identity. It has become so common that I have...

Micropsia Malware

Since June 2018, the Radware Threat Research team has monitored an ongoing APT against the Palestinian authority, featuring an updated version of the Micropsia...

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly...

Battling Cyber Risks with Intelligent Automation

Organizations are losing the cybersecurity race. Cyber threats are evolving faster than security teams can adapt. The proliferation of data from dozens of security products...

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year....

5 Must-Have DDoS Protection Technologies

Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS attacks are not just...

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready...

Stresspaint Malware Campaign Targeting Facebook Credentials

On April 12, 2018, Radware’s threat research group detected malicious activity via internal feeds of a group collecting user credentials and payment methods from...

The Mikrotik RouterOS-Based Botnet

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world...

Putinstresser.eu, a Simple and Powerful Booter and Stresser Service

Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service. Putinstresser.eu is a...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.