Home Security Botnets

Botnets

How E-commerce Sites Can Counter ‘AuthBots’

AuthBots, a new form of malicious software, are targeting the login pages of online retailer sites.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today's botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money.

What You Need to Know About Botnets

Botnets comprised of vulnerable IoT devices, combined with widely available DDoS-as-a-Service tools and anonymous payment mechanisms, have pushed denial-of-service attacks to record-breaking volumes.

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not,...

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know...

IoT Expands the Botnet Universe

In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because IoT devices are always-on,...

Attackers Are Leveraging Automation

Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven to be the catalyst...

Bot or Not? Distinguishing Between the Good, the Bad & the Ugly

Bots touch virtually every part of our digital lives. They help populate our news feeds, tell us the weather, provide stock quotes, control our...

Ad Fraud 101: How Cybercriminals Profit from Clicks

Fraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for today’s malicious actors, which...

Top 6 Threat Discoveries of 2018

Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below is a round-up of...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.