DDoS

6 Must-Have Metrics in Your SLA

Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your DDoS mitigation provider will...

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready...

Choosing the Right DDoS Solution – Part IV: Hybrid Protection

This is the last part of the blog series exploring the various alternatives for protection against DDoS attacks, and how to choose the optimal...

Choosing the Right DDoS Solution – Part III: Always-On Cloud Service

This blog series dives into the different DDoS protection models, in order to help customers choose the optimal protection for their particular use-case. The...

Choosing the Right DDoS Solution – Part II: On-Demand Cloud Service

This blog series explores the various options for DDoS protection and help organizations choose the optimal solution for themselves. The first part of this...

Putinstresser.eu, a Simple and Powerful Booter and Stresser Service

Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service. Putinstresser.eu is a...

Cloud vs DDoS, the Seven Layers of Complexity

A question that I've encountered many times in the field of late is what are the impacts of DDoS attacks on cloud compute environments? ...

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of...

Orchestrating Flows for Cyber

There is a great scene in the movie Victor, Victoria, where the character played by James Garner decides it’s time to mix things up...

Rethinking the Scrubbing Center

In the past five years, we have watched a rapid evolution in both sophistication and scale of DDoS attacks.  Long gone are the days...

Has Cyber Security Reached Its Limits?

Thoughts from Radware’s Global Application and Network Security Report Rise of cryptocurrency trade and value boosts attacks; Notorious attacks of the year point at...

Bad Packets 2017 – A Year in Review

2017 has been another eventful year for denial-of-service attacks.  Radware’s ERT team has monitored a vast number of events, giving me ample opportunities to...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.