Home Security DDoS Attacks

DDoS Attacks

Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security

It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains a major...

The Million-Dollar Question of Cyber-Risk: Invest Now or Pay Later?

Cybersecurity is often an afterthought. Executives are quick to focus on the endgame benefits of customer-centric strategies, digital transformation, mobility, IoT and cloud computing,...

The Delta Airlines Security Breach: A Case Study in How to Respond to a Data Breach

Recent data breaches against Panera Bread, Delta Airlines, Sears, Saks, and Lord & Taylor highlight a lot: the need for improved web application and...

Protecting Sensitive Data: The Death of an SMB

True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true. Due to this lack of...

Cities Paying Ransom: What Does It Mean for Taxpayers?

On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless....

Rate Limiting-A Cure Worse Than the Disease?

Rate limiting is a commonly-used tool to defend against application-layer (L7) DDoS attacks. However, the shortcomings of this approach raises the question of whether...

SIP Protection: What Your SIP Security Solution Should Have

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed...

Choosing the Right DDoS Solution – Part I: On-Prem Appliance

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attacks. However, DDoS...

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of...

Obama’s Cyber-Security Proposals: Does this Safe Platform Translate to a Safer Network?

President Obama’s mention of cyber-security in last night’s State of the Union Address came as no surprise.  The Obama camp implemented a...

The Right Way to Secure Your Applications Against DDoS Using Signaling

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. Let’s face it. DDoS are the big, fat,...

Tsunami SYN Flood Attack – A New Trend in DDoS Attacks?

Over the past week Radware’s Emergency Response Team (ERT) detected a new type of SYN flood which is believed to be specially...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.