Home Security Brute Force Attacks

Brute Force Attacks

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

New Attack Trends – Are You Bringing a Knife to the Gunfight?

Today, we launched our 2012 Global Application and Network Security report. It was prepared by our security experts - the Emergency Response Team (ERT)...

Last Week to Participate! Attack Mitigation Black Belt Final Round Begins Today.

If you've been waiting, now's the time to participate - the last week of Radware's Attack Mitigation Black Belt Challenge begins today and ends...

Calling All Attack Mitigation Experts – Red Belt Round Begins Today!

Two more weeks left in the Attack Mitigation Black Belt Challenge and congratulations to all who have earned a green belt. As we head...

Are you ready for your Green Belt in Attack Mitigation?

Knowledge Test Overview Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition. People...

From SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities Are Nothing New

Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past...

Radware Attack Mitigation Black Belt Challenge – Yellow Belt Round

I want to thank everyone for a successful launch of the Attack Mitigation Black Belt Challenge! People from all over the world participated...

RSA 2012: Learn about the Latest Security Myths

Visit Radware at booth #856. If you're headed to RSA 2012 in San Francisco, we hope you will stop by to meet the Radware team...

Israeli Website Hit with Country’s Largest Volumetric DDoS Attack on Record: What this Says About Cleaning the ISP Pipe

Today, we experienced the highest ever volumetric DDoS attack on an Israeli website. One of the leading news sites in Israel was hit by...

5 Questions About Anonymous’ New DDoS Techniques

In case anyone missed this news, Group Anonymous has put up code at pastehtml.com (a free and anonymous HTML code-hosting site) which uses your...

Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS

Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them as the level of...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.