Recent Articles

OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows

After a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities in its cryptographic library that could trigger crashes or lead to remote code execution (RCE).
Bot Attack

6 Ways Bot Attacks Can Spoil Your Black Friday

The 3 days between “Black Friday” and “Cyber Monday” are when online retailers often enjoy their highest sales numbers for the year. Yes, it’s a very big deal. While consumers and retailers eagerly anticipate this 3-day shopping span, just as eager—unfortunately—are botmasters who are gearing up for...
Cyber threat

2023 IT Security Predictions From Professionals Who Live It Every Day

To beat the prediction rush, Radware reached out to several of our customers to find out what they think 2023 will bring to light in the world of cybersecurity.

The Birth of Cybersecurity

Now that we’re more than a week into October, it’s time to celebrate the birthday—well, birth month—of Cybersecurity Awareness Month. The goal of Cybersecurity Awareness Month is to help individuals protect themselves from threats designed to digitally steal their confidential information. The theme of this year’s Cybersecurity...
Multi-Cloud World

The Multi-Cloud is The New Normal, But Creates Key Security Challenges

The age of the multi-cloud is upon us, but that comes at a cost to security. In a nutshell, this is the key finding of Radware’s new research: Application Security in a Multi-Cloud World. The report, sponsored by Radware and conducted by Osterman Research, shows the extent to which multi-cloud...
The Problem of Badly Configured Web Application Firewalls

The Problem of Badly Configured Web Application Firewalls

Web Application Firewalls (WAFs) have become a critical first line of application defense. Yet configuring and managing them in multi-cloud and on-prem hybrid environments can quickly become overwhelming and risky. In the worst case, each cloud ends up with its own WAF tools, a...

This was H1 2022: Part 3 – Beyond the War

Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget that there is still activity outside the realm of the war. True, the war shifted the focus and priorities of the nations and some crime...
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had concluded that while the tools were still relevant, they were not as popular or effective as they used to be due to the evolution of the threat landscape and...

This was H1 2022: Part 2 – Cyber War

On February 24, 2022, news broke that Russia had initiated its special military operation against Ukraine. That date, which marked the start of the war, will be engraved in our memories for a long time. Preceding the army movements, cyber operations attributed to the state actors of the Russian...

Most Popular

What Drives DDoS Attacks and Why it Should be a Concern

DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

4 Assumptions Preventing Effective API Protection

API Protection
API traffic has tripled in growth compared to the overall API traffic. Here are 4 common misconceptions companies have about API protection.

What it Means to Redefine Success in Cybersecurity

Cyber threats are not going to decrease for the foreseeable future, and the challenges they pose to organizations are very real.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...


2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

Threat landscape
2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape.