Hacks

Cybersecurity as a Selling Point: Retailers Take Note

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details...

Growing Your Business: Security as an Expectation

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear...

Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security

It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains a major...

Network Security Does Not Matter When You Invite the Hacker Inside

We build security solutions to protect our networks from the rest of the internet, but do we do anything to protect the network from...

Is Heat Your Thermostat’s First Priority?

Mirai has been popping on and off the news and is becoming a commodity resource for large scale DDoS attacks. Although most of the...

Australia’s DDoS on the Census

It was reported that Australia’s census was attacked back in August. The Census Bureau reported on Twitter that they were attacked and their site...

Social Engineering

Social Engineering is a process of psychological manipulation, more commonly known in our world as human hacking. The sad reality behind Social Engineering is...

Headaches for the Holidays

We’re fast approaching the biggest holiday shopping season for retailers. Just how big? According to the National Retail Federation’s annual consumer spending survey, consumers...

Profile of a Hacker

As the hacktivist community continues to grow and evolve, so do the tools and services at a hacker’s disposal. The digital divide between skilled...

The deplorable state of IoT security

Following the public release of the Mirai (You can read more about it here) bot code, security analysts fear for a flood of online...

Are you ready for the new age of attacks?

The unprecedented attacks launched recently against Brian Krebs’ blog (Krebs on Security) and the hosting provider OVH highlight the immense damage from IoT-driven botnets,...

BusyBox Botnet Mirai – the warning we’ve all been waiting for?

On Tuesday, September 20th around 8:00PM, KrebsOnSecurity.com was the target of a record-breaking 620Gbps volumetric DDoS attack designed to take the site offline. A few days...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.