Home Security Botnets

Botnets

Defending Against the Mirai Botnet

When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel it. In a 31-day...

The Evolution of IoT Attacks

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over...

IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network Attacks

The development and onset of 5G networks bring a broad array of not only mobile opportunities but also a litany of cybersecurity challenges for...

IoT, 5G Networks and Cybersecurity: The Rise of 5G Networks

Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning of luxury, mobile devices...

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of...

DarkSky Botnet

Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky features several evasion mechanisms, a malware downloader and a variety of network-...

The Rise of Thingbots

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. The Internet can be a pretty scary place. Places...

The Ride from RSA 2014 & Taxi Wars

The RSA Conference was amazing this year -- bigger, more robust and crazier than I have ever seen it.  The only void...

More Bots and Aggressive API Abuse

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers....

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

When Servers Attack Your Bank: The Rise of Server Botnets

Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing...

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.