The Issue & Impact of Malspam in the U.S. Elections

The Issue & Impact of Malspam in the U.S. Elections

Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year. The post The Issue & Impact of Malspam in the U.S ...
How to Respond to a DDoS Ransom Note

How to Respond to a DDoS Ransom Note

The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note. The post How to Respond ...
When You Get Breached, So Do Your Customers

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers. The post When You Get Breached, So Do Your Customers appeared ...
Emotet Attacks Spread Alongside Fears of Coronavirus

Emotet Attacks Spread Alongside Fears of Coronavirus

Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain. The post Emotet Attacks Spread Alongside Fears of Coronavirus appeared first on Radware Blog ...

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states. The post Nation-State Attacks: Motivations & Consequences appeared first on Radware Blog ...

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found. The post Retailers, How Much of ...

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses. The post TCP Reflection Attacks: Then and Now appeared first ...

Threat Alert: TCP Reflection Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection ...
Empowering the Infosec Community

Empowering the Infosec Community

Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the “bad guys” are still a step ahead. Why? In ...
Defacements: The Digital Graffiti of the Internet | Radware's 2019 Hacker's Almanac

Defacements: The Digital Graffiti of the Internet

A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and ...