Home Security Botnets

Botnets

Are you ready for your Green Belt in Attack Mitigation?

Knowledge Test Overview Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition. People...

From SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities Are Nothing New

Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past...

Radware Attack Mitigation Black Belt Challenge – Yellow Belt Round

I want to thank everyone for a successful launch of the Attack Mitigation Black Belt Challenge! People from all over the world participated...

Darkness (Optima) – DDoS for Hire

A clear trend in the security scene these days is the change in attacker profile. Computer hacking and DDoS attacks are no longer reserved...

You May Be Anonymous

According to a recent Norton study, cybercrime cost the global economy (in both direct damage and lost productivity time) $388 billion in 2011--significantly more...

Israeli Website Hit with Country’s Largest Volumetric DDoS Attack on Record: What this Says About Cleaning the ISP Pipe

Today, we experienced the highest ever volumetric DDoS attack on an Israeli website. One of the leading news sites in Israel was hit by...

The Rise of “Auto Attacks,” Step aside Botnets!

Well, in case you missed it, the world has been going to “hell-in-a-hen-basket” over the past two weeks. The weeks have distinguished themselves as...

5 Questions About Anonymous’ New DDoS Techniques

In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting site) which uses your...

Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS

Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them as the level of...

The Hacking Eco-system: Fighting Cyber Attacks to Stay Profitable

Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools.  There is another angle of the cat-and-mouse fight between attackers and victims --...

Security? Defense, Offense, Both?

Boy the world has gotten complicated to defend hasn't it? The old adage, "information security is very basic" turns out not to be true...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.