Home Security Botnets

Botnets

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

New Attack Trends – Are You Bringing a Knife to the Gunfight?

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts - the Emergency Response Team (ERT)...

US Bank Attacks in Review – It’s a Brave New World

An article published in the New York Times last Wednesday touched off a media frenzy by suggesting that Iran has been behind the cyber...

The Malware Update: A Look at the Latest Malware That’s Attacking Business Networks

Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the...

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

If you've been waiting, now's the time to participate - the last week of Radware's Attack Mitigation Black Belt Challenge begins today and ends...

Calling All Attack Mitigation Experts – Red Belt Round Begins Today!

Two more weeks left in the Attack Mitigation Black Belt Challenge and congratulations to all who have earned a green belt. As we head...

Are you ready for your Green Belt in Attack Mitigation?

Knowledge Test Overview Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition. People...

From SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities Are Nothing New

Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past...

Radware Attack Mitigation Black Belt Challenge – Yellow Belt Round

I want to thank everyone for a successful launch of the Attack Mitigation Black Belt Challenge! People from all over the world participated...

Darkness (Optima) – DDoS for Hire

A clear trend in the security scene these days is the change in attacker profile. Computer hacking and DDoS attacks are no longer reserved...

You May Be Anonymous

According to a recent Norton study, cybercrime cost the global economy (in both direct damage and lost productivity time) $388 billion in 2011--significantly more...

Israeli Website Hit with Country’s Largest Volumetric DDoS Attack on Record: What this Says About Cleaning the ISP Pipe

Today, we experienced the highest ever volumetric DDoS attack on an Israeli website. One of the leading news sites in Israel was hit by...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.