Attack Types & Vectors
When You Get Breached, So Do Your Customers
No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers. The post When You Get Breached, So Do Your Customers appeared ...
Emotet Attacks Spread Alongside Fears of Coronavirus
Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain. The post Emotet Attacks Spread Alongside Fears of Coronavirus appeared first on Radware Blog ...
Nation-State Attacks: Motivations & Consequences
Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states. The post Nation-State Attacks: Motivations & Consequences appeared first on Radware Blog ...
Retailers, How Much of Your Holiday Traffic is Actually Human?
In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found. The post Retailers, How Much of ...
TCP Reflection Attacks: Then and Now
Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses. The post TCP Reflection Attacks: Then and Now appeared first ...
Threat Alert: TCP Reflection Attacks
Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection ...
Empowering the Infosec Community
Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the “bad guys” are still a step ahead. Why? In ...
Defacements: The Digital Graffiti of the Internet
A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and ...
Ransomware: To Pay or Not To Pay?
Ransomware is a type of malware that restricts access to user data by encrypting an infected computer’s files in exchange for payment to decrypt. The attacker often distributes a large-scale phishing campaign ...
What You Need to Know About Exploit Kits
Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine. Once a popular avenue for attacks, they are now barely used due ...