Home Security

Security

DDoS Yourself First – Part II: Rise of the Availability Vulnerabilities

Availability problems aren’t necessarily unique; however the testing is certainly different, as I discussed in Part 1 of DDoS Yourself. This “availability security problem” is...

Darkness (Optima) – DDoS for Hire

A clear trend in the security scene these days is the change in attacker profile. Computer hacking and DDoS attacks are no longer reserved...

DDoS Yourself First – Part I: Auditing for DDoS Vulnerabilities

What happens if your company has reason to believe that it may come under a DDoS attack in the near future or recently suffered...

Has Anonymous Really Developed an Ubuntu-based Operating System?

Here’s an interesting, new twist to the Anonymous saga:  Someone apparently has developed an Ubuntu distribution with Anonymous iconography and preloaded tools such as...

Join Radware at the eCrime Congress in London March 13 & 14

Organizations today face a tremendous wave of financially motivated and Hacktivist attacks that threaten their operational continuity and damage their business. Online gaming sites...

Anonymous Attacks – You Don’t Need a Big Crowd in Order to Take Down a Website

In the past year we used to see large campaigns by the anonymous group before launching a cyber attack. The purpose of the campaign...

Operation Blackout: Can Anonymous Succeed on March 31st?

Much has been written about Operation Blackout: the threat of Anonymous to take out the world's thirteen root Internet servers. This operation has been...

RSA 2012: Learn about the Latest Security Myths

Visit Radware at booth #856. If you're headed to RSA 2012 in San Francisco, we hope you will stop by to meet the Radware team...

You can’t hide behind the Clouds

We’re beginning to hear more about content distribution network (CDN) providers burnishing their offerings with WAF-like capabilities.  While it appears to address some of...

In Security: Information Availability is Foundational

Information Availability is needed before Integrity & Confidentiality!!! Before I get into this heresy talk, let me start off by saying “I’m a security guy!” I...

You May Be Anonymous

According to a recent Norton study, cybercrime cost the global economy (in both direct damage and lost productivity time) $388 billion in 2011--significantly more...

Think you are secured? Think again following Anonymous cyber-attacks against Panama government website

On Saturday February 11, 2012 Anonymous Group coordinated a DDoS attack against Panama government website www.presidencia.gob.pa. The site suffered initially from service disruption but...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.