How Bots Use APIs to Infiltrate the Online World

How Bots Use APIs to Infiltrate the Online World

APIs can be highly vulnerable, making them frequent attack targets. And they play a major role and fuel major risks when it comes to bot management. The post How Bots Use APIs to Infiltrate the Online World appeared first on Radware Blog ... Read More
Defacements: The Digital Graffiti of the Internet | Radware's 2019 Hacker's Almanac

Defacements: The Digital Graffiti of the Internet

A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and replacing the current website content with the hacker’s own. Defacements are considered digital graffiti and typically contain some ... Read More
Meet the Four Generations of Bots

Meet the Four Generations of Bots

With the escalating race between bot developers and security experts — along with the increasing use of Javascript and HTML5 web technologies — bots have evolved significantly from their origins as simple scripting tools that used command line interfaces. Bots now leverage full-fledged browsers and are programmed to mimic human ... Read More
5 Simple Bot Management Techniques

5 Simple Bot Management Techniques

| | Attack Mitigation, bot management, Bots
When it comes to detection and mitigation, security and medical treatment have more in common than you may think. Both require careful evaluation of the risks, trade-offs and implications of false positives and false negatives. In both disciplines, it’s critical to use the right treatment or tool for the problem ... Read More
The Emergence of DoS Groups | Radware's 2019 Hacker's Almanac

The Emergence of Denial-of-Service Groups

Denial-of-Service (DoS) attacks are cyberattacks designed to render a computer or network service unavailable to its users. A standard DoS attack is when an attacker utilizes a single machine to launch an attack to exhaust the resources of another machine. A DDoS attack uses multiple machines to exhaust the resources ... Read More
Ransomware: To Pay Or Not To Pay | Radware

Ransomware: To Pay or Not To Pay?

Ransomware is a type of malware that restricts access to user data by encrypting an infected computer’s files in exchange for payment to decrypt. The attacker often distributes a large-scale phishing campaign in the hope that someone will open the malicious attachment or link. Once infected, the device is unusable ... Read More
Behind the Disguise of Trojans | Radware's 2019 Hacker's Almanac

Behind the Disguise of Trojans

A Trojan horse is a malicious computer program masquerading as a useful or otherwise non-malicious, legitimate piece of software. Generally spread via social engineering and web attacks, Trojan horses often install a backdoor for remote access and unauthorized access of the infected machine. An attacker can perform various criminal tasks, ... Read More
Good Bots Vs. Bad Bots: What Is The Impact On Your Business?

Good Bots Vs. Bad Bots: What’s The Impact On Your Business?

Roughly half of today’s internet traffic is non-human (i.e., generated by bots). While some are good—like those that crawl websites for web indexing, content aggregation, and market or pricing intelligence—others are “bad.” These bad bots (roughly 26% of internet traffic) disrupt service, steal data and perform fraudulent activities. And they ... Read More
Redwolf & Radware Demo Video

Understanding DDoS Mitigation with Next-Gen Testing Platforms

DDoS attack testing and comprehensive DDoS mitigation can be a daunting task. In order to truly understand the effectiveness of your mitigation fabric, you need two things: All of the instrumentation necessary to observe how a mitigation platform behaves in real-time against real-world threats; and A next generation testing platform ... Read More
What You Need To Know About Exploit Kits | Radware's 2019 Hacker's Almanac

What You Need to Know About Exploit Kits

Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine. Once a popular avenue for attacks, they are now barely used due to the popularity of other attack vectors, such as cryptomining. However, they are still utilized to deploy ransomware ... Read More