Normalization as an Approach to Norms

The Normalization of DDoS Attacks

In June, I traveled to Israel to attend BsidesTLV and Cyber Week. Both of these events included incredible presentations, workshops, and networking opportunities. They also provided many unique opportunities to discuss research, privacy, and policy on many different levels with industry leaders and government officials from around the world. Some ... Read More
Botnets: DDoS and Beyond

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today’s botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money. As a result, botherders are targeting enterprise and network software, since residential ... Read More
Are Darknet Take-Downs Effective?

Are Darknet Take-Downs Effective?

Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs are generally digital perp walks meant to remind the public that agents are doing their job, we have to ask, are they actually solving the problem? Moreover, does ... Read More
Managing Security Risks in the Cloud

Managing Security Risks in the Cloud

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That’s a problem. If your organization does not have the ability to identify its assets, threats, and vulnerabilities accurately, you’re going to have a bad time. A lack of ... Read More
Radware's 2019 Hacker's Almanac

Here’s How You Can Better Mitigate a Cyberattack

Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build logic chains to better forecast where the state of network security is heading in the future. Last year alone, the initial attributable cost of cyberattacks increased by 52% and 93% ... Read More
Can You Crack the Hack?

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This cyberattack is an automated bot-based attack It uses automation tools such as cURL and PhantomJS It leverages breached usernames and passwords Its primary goal is to hijack accounts to access ... Read More
Bots 101: This is Why We Can’t Have Nice Things

Bots 101: This is Why We Can’t Have Nice Things

In our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I use bots at Radware to aggregate data for intelligence feeds or to automate a repetitive task. I also spend a vast majority of time researching and ... Read More
How Secure Is Your Digital Super Bowl Experience?

How Secure Is Your Digital Super Bowl Experience?

Over the last few years I have traveled around the world, researching and watching stadiums digitally evolve from the structures I once knew as a kid. I grew up watching the San Diego Chargers play in what was then called Jack Murphy Stadium and now find myself looking at stadiums ... Read More
Top 3 Cyberattacks Targeting Proxy Servers

Top 3 Cyberattacks Targeting Proxy Servers

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitator of access to content and networks, proxy servers have become a focal point for ... Read More
Threat Alert: MalSpam

Threat Alert: MalSpam

Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are designed to commit fraud via credential theft by sending MalSpam, malicious spam that contains banking malware like Trickbot and Emotet, to unsuspecting users. If the users open the document, they ... Read More
Loading...