main

Attack Types & VectorsSecurity

Evolution is the Name of the Game

November 2, 2017 — by Radware2

evolution-q-and-a-960x676.jpg

The following is a Q&A with Daniel Smith, an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

Attack Types & VectorsSecurity

2016: The Year of Cyber Ransom

December 27, 2016 — by Radware1

cyber-ransom-roundup-960x640.jpg

In 2015, we made a number of predictions for the upcoming year. One of the bigger predictions was that we would see the continued rise of ransomware and RDoS (ransom-denial-of-service) attacks. When we look back at the year, we were right – 56% of companies we surveyed reported being threatened in this manner.

Because these attacks have become so prevalent, it’s important to understand the motives behind them, and how to protect your organization. Below is a round-up of some of our most popular blog posts to bring you up to speed on this threat:

Attack Types & VectorsDDoSSecurity

As Cyber Security Programs Lose Their Moorings to Ransom-DoS: Radware Introduces the Ultimate Guide to Cyber Ransom

September 14, 2016 — by Carl Herberger0

ransom-everywhere-2-960x640.png

The Growing Threat of Ransomware and RDoS—and What to Do About It

Welcome to the world of cyber ransom—one of the fastest-growing security concerns around the globe. Other types of attacks, such as Advanced Persistent Threats or Multi-Layer Attacks, take a long time to defend against or even to detect. By contrast, ransomware and RDoS threats shout, “I’m an attack and I’m right here!” You then have 24 to 48 hours to pay the ransom or suffer the loss. At its root, the concept is hardly novel; blackmail has been around for ages. Today it has morphed into some decidedly modern and malicious varieties: