Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s malware protection service detected a zero-day malware threat at one of its customers, a global manufacturing firm, by using machine-learning algorithms. This malware campaign is propagating via socially-engineered links on Facebook and is infecting users by ... Read More
The Mikrotik RouterOS-Based Botnet

The Mikrotik RouterOS-Based Botnet

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new propagating botnet exploiting vulnerabilities in their RouterOS operating system, allowing attackers to remotely execute code on the device ... Read More
A Quick History of IoT Botnets

A Quick History of IoT Botnets

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These devices feature sensors and an IP address for Internet connectivity, enabling these ... Read More
New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of the Satori botnet capable of aggressive scanning and exploitation of CVE-2017-18046 – Dasan Unauthenticated Remote Code Execution. Referred to as “Satori.Dasan,” it’s been rapidly expanding ... Read More
Taking Stock of Application-Layer Security Threats

Taking Stock of Application-Layer Security Threats

The financial services industry is, by its very nature, inherently risk adverse. The sheer volume of transactional data moving through networks can be staggering and protecting that data from cyberthreats is strategically and fiscally critical. To understand how financial service executives keep their most prized applications secure, Radware surveyed over ... Read More
Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

The retail industry is undergoing a transformative period as the “empowered” consumer, driven by technological advances and breakthroughs, impacts how retailers market, communicate and sell. Retailers continue to erode the barrier to purchase via a myriad of new technologies, such as mobile apps, social media transactions and AI that converse ... Read More
The Healthcare / Cyber-Security Connection

The Healthcare / Cyber-Security Connection

One of the businesses in the spotlight lately when it comes to cyber-attacks is healthcare – in fact, 46% of healthcare organizations experienced a data breach. The data associated with this industry is extremely sensitive and highly regulated, and also actively sought by hackers. It has even gotten to the ... Read More
Ransomware, Automation, and IoT Bots, Oh My!

Ransomware, Automation, and IoT Bots, Oh My!

Happy New Year to all our readers! In 2017, we conducted several studies and wrote several reports on the state of cyber security. Let’s take a look at how 2017 shaped up: How Lucrative is Confidential Data? Prime Bounty for Hackers, Top Concern for Businesses Radware’s annual Global Application & ... Read More
The Radware Research Roundup

The Radware Research Roundup

As 2017 comes to a close, we decided to take a look back at a number of new attack types and threats that we saw throughout the year. Our team took a deep dive into researching and testing many of these threats to find out how they operate and how ... Read More
2017 in Review: Your Favorite Posts

2017 in Review: Your Favorite Posts

Another year has come and gone, full of all sorts of new cyber-attacks and vulnerabilities. Which subjects did our readers find the most fascinating this year? Privacy, open-source tools, and a new botnet threat called Reaper were just a few. Below are the top 10 posts that you kept coming ... Read More
Loading...