threats

Report: Emotet Botnet Is Back, With a Vengeance

A report published this week by Proofpoint shines some light on how big an impact a single botnet can have on the cybersecurity landscape. Last May, the Emotet bot went offline for ...
Security Boulevard

More Destructive Botnets and Attack Vectors Are on Their Way

| | botnet, botnets, ddos, iot
If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions. The post More Destructive Botnets and Attack Vectors Are on Their ...
Discovery of Geost Botnet Made Possible by Attacker OpSec Fails

Discovery of Geost Botnet Made Possible by Attacker OpSec Fails

A series of operational security (OpSec) failures on the part of attackers enabled researchers to discover the Geost botnet. In mid-2018, Virus Bulletin researchers Sebastian Garcia, María José Erquiaga and Anna Shirokova ...

Emotet Botnet Returns After Four-Month Hiatus With New Spam Campaign

The actors responsible for the Emotet botnet returned after a four-month period of inactivity with a new malspam campaign. On 16 September, SpamHaus security researcher Raashid Bhat spotted a spate of new ...
Layer 7 attack

Imperva Blocks Our Largest DDoS L7/Brute Force Attack Ever (Peaking at 292,000 RPS)

Imagine you’re a developer building a new web application. You’ve followed all of the security best practices, hired a reputable penetration testing company before launch, and gone through extensive bug fixing to ...
What You Need To Know About Botnets | Radware's 2019 Hacker's Almanac

What You Need to Know About Botnets

Botnets comprised of vulnerable IoT devices, combined with widely available DDoS-as-a-Service tools and anonymous payment mechanisms, have pushed denial-of-service attacks to record-breaking volumes. A single attack can result in downtime, lost business ...
CapLoader 1.8

CapLoader 1.8 Released

We are happy to announce the release of CapLoader 1.8 today! CapLoader is primarily used to filter, slice and dice large PCAP datasets into smaller ones. This new version contains several new ...
How Robots Are Saving the Dairy Farm

Are Connected Cows a Hacker’s Dream?

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not, farmers are increasingly relying on IoT devices to keep their cattle connected ...
Security Pros and Perils of Serverless Architecture

Security Pros and Perils of Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software ...
Will We Ever See the End of Account Theft?

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the ...