The Rise of Thingbots

November 19, 2014 — by David Monahan6

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.

Attack MitigationBotnetsSecurity

The Ride from RSA 2014 & Taxi Wars

March 6, 2014 — by David Hobbs0

The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it.  The only void I noticed among the technical vendors was addressing the issue of hacktivism.  In the packed conference and crowed exhibition halls, I never came across a discussion about this phenomenon.  Can we forecast this risk?  Do we know its long term effects?  I think most of us are still befuddled by this concept. 


More Bots and Aggressive API Abuse

November 4, 2013 — by David Hobbs1

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers. Recently, more light has been shed upon even more abuse coming to the Web in the form of aggressive API’s and bots to automate Web processes. Beyond competitors and price index advantages, people are using bots for profits and personal advantages. 

Attack MitigationBotnetsSecurity

Bots and Scripts for Abuse

August 9, 2013 — by David Hobbs2

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’ websites for business intelligence purposes is quickly becoming a common practice. Recently, an article by Slashdot shared that people are even using bots and scripts to score restaurant reservations. Likewise, Variable Pricing software and methods are being used by many e-commerce websites in order to reduce their sales costs and obtain greater control over the buying process.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

February 8, 2013 — by Ron Meyran0

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksSecurity

Shooting From Behind the Fence

February 8, 2013 — by Eyal Benishti0

Can You Stay Anonymous While Participating in a DDoS Attack?
Taking part in a Hacktivist group is completely different than being part of a Botnet. In a Botnet, case participants are unknowingly “recruited” to an attack. In the Hacktivist group, case members take part in attack activities on their own accord.
Just this past month, Anonymous hackers in London were jailed for a series of DDoS attacks on PayPal and other payment services such as Visa and MasterCard.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

New Attack Trends – Are You Bringing a Knife to the Gunfight?

January 22, 2013 — by Ziv Gadot0

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts – the Emergency Response Team (ERT) – who’ve seen their fair share of cyber attacks while actively monitoring and mitigating attacks in real-time. In this year’s annual report, our experts have uncovered several new trends in cyber-security worthy of a closer look.

Attack MitigationBotnetsDDoS AttacksSecurity

US Bank Attacks in Review – It’s a Brave New World

January 14, 2013 — by Carl Herberger1

An article published in the New York Times last Wednesday touched off a media frenzy by suggesting that Iran has been behind the cyber attacks on US financial institutions taking place since late September of last year. While the questions of forensics and culpability pose a particular challenge when it comes to cyber security, there are a number of unprecedented components to these attacks that should absolutely command our attention.

Attack MitigationBotnetsDDoS AttacksSecurity

The Malware Update: A Look at the Latest Malware That’s Attacking Business Networks

July 19, 2012 — by David Hobbs0

Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the secure platform myths have been busted, we have definitely crossed into new territory this year.

First of all, malware is now very much a mainstream business practice. Years ago, security researchers found exploits and disclosed them to companies for the purpose of fixing the hole. Today, some researchers may still use the same code of ethics, however, there’s profit to be had in return for finding flaws in systems. The buyers of these exploits could be businesses wishing to target each other in competitive infection or spying. Also, being that new cold war strategies of governments include hacking other countries and their resident companies, there is vast profit to be potentially earned by hackers.