Home Security Attack Mitigation

Attack Mitigation

A Flaw Worth Fixing? How We Tested (And Stopped) the Facebook Notes Flaw

Recently, independent researcher Chaman Thapa published a report on an attack scenario showing how someone could use Facebook Notes to DDoS any website. ...

WordPress DDoS and other HTTP Reflectors

Lately, there has been a lot of buzz about reflection and amplification attacks extending DDoS harm.  The new kid on this attack...

Was NATO Hit by a DNS Attack?

The latest developments in the Russia-Ukraine cyberwar battle have garnered huge media attention.  It was also recently revealed that the cyber attacks...

Can a Boeing 777 Airliner be Brought Down by a Cyber Attack?

Bottom line: It is not only conceivable, but Boeing itself has warned about it. As a former United States Air Force Aviator, and also...

Geopolitics and Cyber: A New War?

This week, I was interview by Fox Business on how hacktivism takes center stage when geopolitical tensions rise. (Geopolitical Tensions Invade Cyberspace, March 11,...

The Ride from RSA 2014 & Taxi Wars

The RSA Conference was amazing this year -- bigger, more robust and crazier than I have ever seen it.  The only void...

Credit Card Breach at a Major U.S. Retailer – Are you one of the 40 Million Targeted?

If you’re one of the 40+ million people who went shopping this holiday season at Target, hackers may have stolen the information that’s carried...

Personal Data – When the Invaluable Falls into the Wrong Hands

Recently, the news has listed numerous egregious data thefts from large insurance companies as well as concerns of data security from the infamous Healthcare.gov...

Five Indications that an “Electronic Pearl Harbor” is Possible, if not Plausible

During the past year, we have become numb to the sheer outrage of cyber-attacks and the devastating impacts they have left in our wake....

A Look Back at Black Hat: Staying True to its Roots, But Never the Same without Barnaby Jack

Black Hat has come and gone again, the swag has been dispersed, the livers are recovering and delegates are returning to their normal lives...

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

Killer Apps or Apps that Kill? How the “Soft War” is replacing the Cold War in 2013

Last night, the Wall Street Journal ran a story around the Food and Drug Administration’s (FDA) warning to makers of medical devices that the...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.