Home Security Attack Types & Vectors

Attack Types & Vectors

Choosing the Right DDoS Solution – Part I: On-Prem Appliance

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attacks. However, DDoS...

Entering into the 1Tbps Era

Background On February 27th Radware noticed an increase in activity on UDP port 11211. As other organizations began to disclose a trend in UDP amplified...

A Quick History of IoT Botnets

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such...

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information...

42% of Organizations Experienced Burst Attacks; The Rest Were Unaware They Were Attacked

One of the prominent trends in 2017 was an increase in short-burst attacks, which have become more complex, more frequent and longer in duration....

1984 to 2018: The Evolution of the Olympics

Change is inevitable and it happens in every industry. Those that evolve with change often help lead the transformation and revolutionize their domain. In...

Are You Protected Against Burst Attacks?

Common DDoS attacks come in the form of sustained, high-volume traffic floods that ramp up gradually, reach a peak, and are then followed by...

Is My Smart Home Telling People What I Do Every Day?

2017 will forever be known as the year that the smart home started to take off.  Researchers estimate that Amazon has sold over 15...

DarkSky Botnet

Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky features several evasion mechanisms, a malware downloader and a variety of network-...

JenX – Los Calvos de San Calvicie

A new botnet recently started recruiting IoT devices. The botnet uses hosted servers to find and infect new victims leveraging one of two known...

2018 Winter Olympics

As the 2018 Winter Olympics in PyeongChang approaches, Radware’s Emergency Response Team (ERT) and Threat Research Center turn their attention to the large crowds...

Has Cyber Security Reached Its Limits?

Thoughts from Radware’s Global Application and Network Security Report Rise of cryptocurrency trade and value boosts attacks; Notorious attacks of the year point at...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.