When You Get Breached, So Do Your Customers

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers. The post When You Get Breached, So Do Your Customers appeared ...
Emotet Attacks Spread Alongside Fears of Coronavirus

Emotet Attacks Spread Alongside Fears of Coronavirus

Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain. The post Emotet Attacks Spread Alongside Fears of Coronavirus appeared first on Radware Blog ...

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states. The post Nation-State Attacks: Motivations & Consequences appeared first on Radware Blog ...

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found. The post Retailers, How Much of ...

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses. The post TCP Reflection Attacks: Then and Now appeared first ...

Threat Alert: TCP Reflection Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection ...
Empowering the Infosec Community

Empowering the Infosec Community

Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the “bad guys” are still a step ahead. Why? In ...
Defacements: The Digital Graffiti of the Internet | Radware's 2019 Hacker's Almanac

Defacements: The Digital Graffiti of the Internet

A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and ...
Ransomware: To Pay Or Not To Pay | Radware

Ransomware: To Pay or Not To Pay?

Ransomware is a type of malware that restricts access to user data by encrypting an infected computer’s files in exchange for payment to decrypt. The attacker often distributes a large-scale phishing campaign ...
What You Need To Know About Exploit Kits | Radware's 2019 Hacker's Almanac

What You Need to Know About Exploit Kits

Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine. Once a popular avenue for attacks, they are now barely used due ...