Security Pros and Perils of Serverless Architecture

Security Pros and Perils of Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software ...
Will We Ever See the End of Account Theft?

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the ...
Network of platforms with bots on top botnet cybersecurity concept 3D illustration

The Challenges of DIY Botnet Detection – and How to Overcome Them

Botnets have been around for over two decades, and with the rise of the Internet of Things (IoT) they have spread further to devices no one imagined they would – printers, webcams, ...
Ad Fraud 101: How Cybercriminals Profit from Clicks

Ad Fraud 101: How Cybercriminals Profit from Clicks

Fraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for today’s malicious actors, which is reflected in the rampant use of identity ...
Top 6 Threat Discoveries of 2018

Top 6 Threat Discoveries of 2018

Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below is a round-up of our top discoveries from the past year. For ...
Vulnerable to BEC Fraud

Email Spam Campaign Targets U.S. Retail, Restaurant Sectors

A cybercriminal group has launched a malware campaign via personalized spear-phishing emails against large retail, restaurant and grocery chains in the United States, as well as against other organizations from the food ...
Security Boulevard
2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks. We saw sensational attacks on APIs, the ability ...
Eight Individuals Indicted for Perpetrating Digital Advertising Fraud

Eight Individuals Indicted for Perpetrating Digital Advertising Fraud

A federal indictment charged eight individuals with perpetrating widespread digital advertising fraud that cost businesses millions of dollars. On 27 November, a federal court in Brooklyn unsealed the indictment charging Aleksandr Zhukov, ...

This D-Link Camera Has a Huge Security Flaw, According to Consumer Reports

Internet-enabled and IoT devices have made it possible to deploy a custom home security system. One can purchase many wireless security cameras, sensors and motion detectors and install them around their home ...
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

TL;DR Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The geographic spread of vulnerable servers and the targets ...
Loading...