Home Security

Security

ERT ALERT: Cyber-attack Against U.S. Based Websites on May 7th – 4 Attack Methods to Expect

AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA. The attack is scheduled for May...

WordPress Sites Exploited Through Brute Force: 3 Simple Ways to Protect Yourself from the Attack

During the past week we noticed an abnormal increase of brute force attacks targeting WordPress applications. The attacks use automated scripts that attempt to login...

DefenseFlow: The First Ever SDN Application That Programs Networks for DoS/DDoS Security

Radware has announced its comprehensive SDN strategy and has introduced its first SDN Application: DefenseFlow™. Why is the DefenseFlow™ release so exciting? SDN is all...

ERT Alert: Massive #OpIsrael Attack Set for April 7

According to a March 19th post on the Solidarite avec la Palestine Facebook page, multiple hacker groups are joining hands to launch a massive...

How Application Delivery and Security Work Hand-in-Hand

At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from different domains. But...

Inside the World of Hacker Reconnaissance

The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers...

SDN and OpenFlow in 2013 – A Look Ahead

In 2012 OpenFlow discussions turned into SDN ones. Related although different in significant ways, both OpenFlow and SDN drove a significant level of attention...

Stock Exchanges in the Line of Fire

During last week's RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire - Morphology of Cyber...

Security: On-Premise or In the Cloud? Radware’s DefensePipe Offers an End-to-End Solution

While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud. Now, you can stop...

When Servers Attack Your Bank: The Rise of Server Botnets

Imagine the following scenario: You’re a hosting company and you receive a call from one of the largest banks in the United States informing...

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Shooting From Behind the Fence

Can You Stay Anonymous While Participating in a DDoS Attack? Taking part in a Hacktivist group is completely different than being part of a Botnet....

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.