Home Security Botnets

Botnets

Cities Paying Ransom: What Does It Mean for Taxpayers?

On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless....

Don’t Let Your Data Seep Through The Cracks: Cybersecurity For the Smart Home

Technology and wireless connectivity have forever changed households. While we don’t have the personal hovercrafts or jetpacks that we were promised as children, infinite...

Defending Against the Mirai Botnet

When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel it. In a 31-day...

The Evolution of IoT Attacks

What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect and exchange data over...

IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network Attacks

The development and onset of 5G networks bring a broad array of not only mobile opportunities but also a litany of cybersecurity challenges for...

IoT, 5G Networks and Cybersecurity: The Rise of 5G Networks

Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning of luxury, mobile devices...

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of...

DarkSky Botnet

Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky features several evasion mechanisms, a malware downloader and a variety of network-...

The Rise of Thingbots

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. The Internet can be a pretty scary place. Places...

The Ride from RSA 2014 & Taxi Wars

The RSA Conference was amazing this year -- bigger, more robust and crazier than I have ever seen it.  The only void...

More Bots and Aggressive API Abuse

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers....

Bots and Scripts for Abuse

In the last few years, we’ve discovered that many of our customers have been putting up with artificial clients hitting their websites. Scraping competitors’...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.