Home Security Botnets

Botnets

The Rise of Thingbots

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. The Internet can be a pretty scary place. Places...

The Ride from RSA 2014 & Taxi Wars

The RSA Conference was amazing this year -- bigger, more robust and crazier than I have ever seen it.  The only void...

More Bots and Aggressive API Abuse

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers....

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

When Servers Attack Your Bank: The Rise of Server Botnets

Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing...

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

New Attack Trends – Are You Bringing a Knife to the Gunfight?

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts - the Emergency Response Team (ERT)...

US Bank Attacks in Review – It’s a Brave New World

An article published in the New York Times last Wednesday touched off a media frenzy by suggesting that Iran has been behind the cyber...

The Malware Update: A Look at the Latest Malware That’s Attacking Business Networks

Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the...

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

If you've been waiting, now's the time to participate - the last week of Radware's Attack Mitigation Black Belt Challenge begins today and ends...

Calling All Attack Mitigation Experts – Red Belt Round Begins Today!

Two more weeks left in the Attack Mitigation Black Belt Challenge and congratulations to all who have earned a green belt. As we head...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.