Home Security Attack Types & Vectors

Attack Types & Vectors

The Radware Research Roundup

As 2017 comes to a close, we decided to take a look back at a number of new attack types and threats that we...

Bad Packets 2017 – A Year in Review

2017 has been another eventful year for denial-of-service attacks.  Radware’s ERT team has monitored a vast number of events, giving me ample opportunities to...

Retail’s #1 Demographic This Holiday? Bots.

More than half of all internet traffic is bot-driven.  That means, if you have a website, you have experienced bots in one way or...

Evolution is the Name of the Game

The following is a Q&A with Daniel Smith, an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk...

Everything You Need to Know About DDoS Attacks

Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and damaging cyber-attacks. Let’s...

Why the World is Under the Spell of IoT_Reaper

It’s difficult to have missed the headlines on the new IoT botnet threat that is forming and the storm that might come with it....

DDoS Attackers Call for DDoS Defenders

In late July we were approached by a government agency of a Latin American country who was suffering from an over-a-month long campaign of...

The Dyn Attack – One Year Later

One year ago, a threat actor launched a DDoS attack that disrupted service of some of the internet’s biggest names. The Mirai botnet had...

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

THE BUSINESS PROBLEM: Your company has reason to believe that it may be attacked in the near future or recently has come under attack. The...

The Growth of DDoS-as-a-Service: Stresser Services

The growth of DDoS-as-a-Service has resulted in a wide array of powerful and affordable DDoS services available to the public. Since the beginning of...

Do Hackers Have It Easy?

Hackers got it easy. At least, it feels like it. They are in a growing "industry" with many, almost endless, targets to choose from....

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2)

This is Part 2 of our series on the top 5 most dangerous DDoS attacks and how you can successfully mitigate them. To read...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.