Home Security Botnets

Botnets

Radware Threat Researchers Live: DDoS & IoT Botnets

In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens geek out on what's current in DDoS and IoT Botnets.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

Bot Management Keeps Online Gamers & Businesses Happy

The online gaming industry experiences peak engagement & sales during the holiday season. Along with peak traffic comes a lot of unwelcome bot traffic.

How E-commerce Sites Can Counter ‘AuthBots’

AuthBots, a new form of malicious software, are targeting the login pages of online retailer sites.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today's botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money.

What You Need to Know About Botnets

Botnets comprised of vulnerable IoT devices, combined with widely available DDoS-as-a-Service tools and anonymous payment mechanisms, have pushed denial-of-service attacks to record-breaking volumes.

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not,...

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know...

IoT Expands the Botnet Universe

In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because IoT devices are always-on,...

Attackers Are Leveraging Automation

Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven to be the catalyst...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.