Ransomware: To Pay Or Not To Pay | Radware

Ransomware: To Pay or Not To Pay?

Ransomware is a type of malware that restricts access to user data by encrypting an infected computer’s files in exchange for payment to decrypt. The attacker often distributes a large-scale phishing campaign in the hope that someone will open the malicious attachment or link. Once infected, the device is unusable ... Read More
Behind the Disguise of Trojans | Radware's 2019 Hacker's Almanac

Behind the Disguise of Trojans

A Trojan horse is a malicious computer program masquerading as a useful or otherwise non-malicious, legitimate piece of software. Generally spread via social engineering and web attacks, Trojan horses often install a backdoor for remote access and unauthorized access of the infected machine. An attacker can perform various criminal tasks, ... Read More
Good Bots Vs. Bad Bots: What Is The Impact On Your Business?

Good Bots Vs. Bad Bots: What’s The Impact On Your Business?

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content aggregation, and market or pricing intelligence—others are “bad.” These bad bots (roughly 26% of internet traffic) disrupt service, steal data and perform fraudulent activities. And they ... Read More
Redwolf & Radware Demo Video

Understanding DDoS Mitigation with Next-Gen Testing Platforms

DDoS attack testing and comprehensive DDoS mitigation can be a daunting task. In order to truly understand the effectiveness of your mitigation fabric, you need two things: All of the instrumentation necessary to observe how a mitigation platform behaves in real-time against real-world threats; and A next generation testing platform ... Read More
What You Need To Know About Exploit Kits | Radware's 2019 Hacker's Almanac

What You Need to Know About Exploit Kits

Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine. Once a popular avenue for attacks, they are now barely used due to the popularity of other attack vectors, such as cryptomining. However, they are still utilized to deploy ransomware ... Read More
Bots in the Boardroom

Bots in the Boardroom

This year, 82% of Radware’s C-Suite Perspectives survey respondents reported a focus on automation compared to 71% who indicated the same response in 2018. What’s driving the need for increased automation in cybersecurity solutions? The increasing threat posed by next-generation malicious bots that mimic human behavior. Vulnerabilities Abound Almost half ... Read More
C-Suite Perspectives: Turn Cybersecurity Into A Competitive Differentiator

Executives’ Changing Views on Cybersecurity

What does the shift in how cybersecurity is viewed by senior executives within organizations mean? To find out, Radware surveyed more than 260 executives worldwide and discovered that cybersecurity has moved well beyond the domain of the IT department and is now the direct responsibility of senior executives. Security as ... Read More
The Impact of GDPR One Year In

The Impact of GDPR One Year In

Data breaches are expensive, and the costs are only going up. Those reporting attacks that cost 10 million USD/EUR/GBP or more almost doubled from last year — from 7% in 2018 to 13% in 2019. Half of Radware’s C-Suite Perspectives survey respondents estimated that an attack cost somewhere between 500,001 ... Read More
Transforming Into a Multicloud Environment

Transforming Into a Multicloud Environment

| | Cloud, Cloud Security, multicloud
While C-suite executives are taking on larger roles in proactively discussing cybersecurity issues, they are also evaluating how to leverage advances in technology to improve business agility. But as network architectures get more complex, there is added pressure to secure new points of attack vulnerability. Organizations continue to host applications ... Read More
IDBA: A Proprietary Bot Detection Technology

IDBA: A Proprietary Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or ... Read More