Security Pros and Perils of Serverless Architecture

Security Pros and Perils of Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software ...
Understanding the Darknet and Its Impact on Cybersecurity

Understanding the Darknet and Its Impact on Cybersecurity

The darknet is a very real concern for today’s businesses. In recent years, it has redefined the art of hacking and, in the process, dramatically expanded the threat landscape that organizations now ...
What Do Banks and Cybersecurity Have in Common? Everything.

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the ...
ddos attack was most packets unleashed ever

This DDoS Attack Unleashed the Most Packets Per Second Ever. Here’s Why That’s Important.

DDoS attacks are usually measured by the amount of bandwidth involved, such as the 1.35 Terabits per second (maximum) attack directed at GitHub last year, the largest DDoS attack ever at the ...
The Rise in Cryptomining

The Rise in Cryptomining

There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction of attackers are cybercriminals, individuals or well-established organizations looking to turn a ...
Top 3 Cyberattacks Targeting Proxy Servers

Top 3 Cyberattacks Targeting Proxy Servers

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a ...
Bot or Not? Distinguishing Between the Good, the Bad and the Ugly

Bot or Not? Distinguishing Between the Good, the Bad and the Ugly

Bots touch virtually every part of our digital lives. They help populate our news feeds, tell us the weather, provide stock quotes, control our search rankings, and help us comparison shop. We ...
2018 In Review: Memcache and Drupalgeddon

2018 In Review: Memcache and Drupalgeddon

Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will ...
Top 6 Threat Discoveries of 2018

Top 6 Threat Discoveries of 2018

Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below is a round-up of our top discoveries from the past year. For ...
2018 In Review: Healthcare Under Attack

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s ...
Loading...