Home Security Botnets

Botnets

IoT Botnets: Perspectives from a Residential Router

Residential routers face risks from the propagation of IoT botnets and the problem devices present once they are infected.

Radware Threat Researchers Live: Bots, Botnets & Gaming

In the latest episode of Radware Threat Researchers Live, Daniel Smith and Pascal Geenens discuss what's new in botnets.

How to Prevent Pay-Per-Registration Fraud

Registration fraud is difficult to detect and directly affects revenues. But you can avoid the damage when treating this threat as a business matter.

Ghosting Bots: The Story of Hoaxcalls Failures

The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building a botnet campaign.

Radware Threat Researchers Live: DDoS & IoT Botnets

In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens geek out on what's current in DDoS and IoT Botnets.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

Bot Management Keeps Online Gamers & Businesses Happy

The online gaming industry experiences peak engagement & sales during the holiday season. Along with peak traffic comes a lot of unwelcome bot traffic.

How E-commerce Sites Can Counter ‘AuthBots’

AuthBots, a new form of malicious software, are targeting the login pages of online retailer sites.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today's botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money.

What You Need to Know About Botnets

Botnets comprised of vulnerable IoT devices, combined with widely available DDoS-as-a-Service tools and anonymous payment mechanisms, have pushed denial-of-service attacks to record-breaking volumes.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.