Defacements: The Digital Graffiti of the Internet | Radware's 2019 Hacker's Almanac

Defacements: The Digital Graffiti of the Internet

A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and ...
Ransomware: To Pay Or Not To Pay | Radware

Ransomware: To Pay or Not To Pay?

Ransomware is a type of malware that restricts access to user data by encrypting an infected computer’s files in exchange for payment to decrypt. The attacker often distributes a large-scale phishing campaign ...
Behind the Disguise of Trojans | Radware's 2019 Hacker's Almanac

Behind the Disguise of Trojans

A Trojan horse is a malicious computer program masquerading as a useful or otherwise non-malicious, legitimate piece of software. Generally spread via social engineering and web attacks, Trojan horses often install a ...
What You Need To Know About Exploit Kits | Radware's 2019 Hacker's Almanac

What You Need to Know About Exploit Kits

Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine. Once a popular avenue for attacks, they are now barely used due ...
Can You Crack the Hack?

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This cyberattack is an automated bot-based attack It uses automation tools such as ...
Anatomy of a Cloud-Native Data Breach

Anatomy of a Cloud-Native Data Breach

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow ...
How Robots Are Saving the Dairy Farm

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not, farmers are increasingly relying on IoT devices to keep their cattle connected ...
What is a Zero-Day Attack?

What is a Zero-Day Attack?

Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature. Security systems and experts must react instantly to solve the new issues, ...
CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats

CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats

According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While ‘good’ bots discreetly index websites, fetch information and content, and perform useful ...
Bots 101: This is Why We Can’t Have Nice Things

Bots 101: This is Why We Can’t Have Nice Things

In our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I use bots at Radware to aggregate data for ...
Loading...