Beware the Security Threats from Remote Working
The rapid move to home working is posing problems for CIOs who want to keep the network secure. Here's what must happen to protect the network and its data. The post Beware the Security Threats from Remote Working appeared first on Radware Blog ... Read More
Coronavirus: Its Four Most Prevalent Cyber Threats
The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19. The post Coronavirus: Its Four Most Prevalent Cyber Threats appeared first on Radware Blog ... Read More
Security is on the Verge of a Major Transformation
While the internet can adapt to higher throughputs for richer data and more connected devices,it cannot adapt to the new requirements for lower latency. The post Security is on the Verge of a Major Transformation appeared first on Radware Blog ... Read More
Threats on APIs and Mobile Applications
Web Application Programming Interfaces, or Web APIs, are essential building blocks of our digital lives. They provide the tools and protocols that enable web and mobile applications to provide dynamic content and up to date, personalized information. Our cars, bikes, and fitness trackers rely on Web APIs to track and ... Read More
Looking Past the Hype to Discover the Real Potential of AI
How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into their security strategies now to take advantage of the technology’s ability to detect and mitigate attacks that incorporate the same capabilities? Pascal Geenens, Radware’s EMEA ... Read More
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits
TL;DR Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The geographic spread of vulnerable servers and the targets of the attacks is global and concentrated in regions with high cloud data center densities Motivations behind the ... Read More
New DemonBot Discovered
Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS attacks powered by the strength of cloud infrastructure servers. Hadoop is an open source distributed processing framework that manages storage and data processing for big data ... Read More
IoT Hackers Trick Brazilian Bank Customers into Providing Sensitive Information
Radware Threat Research Center has identified a hijacking campaign aimed at Brazilian Bank customers through their IoT devices, attempting to gain their bank credentials. The research center has been tracking malicious activity targeting DLink DSL modem routers in Brazil since June 8th. Through known old exploits dating from 2015, a ... Read More
Can SNMP (Still) Be Used to Detect DDoS Attacks?
SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component in many networks for monitoring the health and resource utilization of devices and connections. For a long time, SNMP was the tool to monitor bandwidth and interface utilization. In this ... Read More
Putinstresser.eu, a Simple and Powerful Booter and Stresser Service
Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service. Putinstresser.eu is a fairly recent player, an addition to the growing number of low-priced DDoS-as-a-Service, commonly known as booters and stressers, services. The site illustrates the maturity and ... Read More

