Disaster Recovery: Data Center or Host Infrastructure Reroute

Disaster Recovery: Data Center or Host Infrastructure Reroute

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had ...
Bank of Spain Reveals Its Website Suffered a DoS Attack

Bank of Spain Reveals Its Website Suffered a DoS Attack

The Bank of Spain revealed that bad actors used a denial-of-service (DoS) attack to temporarily disrupt access to its website. On 27 August, a spokesperson for Spain’s central bank disclosed the attack ...
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool – web browsers. At every point in time, ...
SIP Protection: What Your SIP Security Solution Should Have

SIP Protection: What Your SIP Security Solution Should Have

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed these days, the industry should put greater emphasis ...
Users can examine activities on specific dates by filtering, as shown.

How We Found & Exploited a Layer 7 DoS Attack on FogBugz

Modern day Denial of Service (DoS) attacks cause much consternation in the web security industry because they are so inexpensive, easy... and devastating! While the cost of conducting such attacks decreases by ...
DEF CON 21 - Ming Chow - Abusing NoSQL Databases

Application Level Denial of Service – An In-Depth Guide

Denial of Service attacks that bring down popular websites often involve thousands of hacked consumer devices and servers. While these attacks mainly aim to overwhelm the target system with traffic, in order ...
Researchers use sound to compromise hard drives in new DOS proof-of-concept

Researchers use sound to compromise hard drives in new DOS proof-of-concept

In an entirely new twist on the security of hard disk drives (HDDs), a team of researchers from Princeton and Purdue University have released a paper demonstrating how acoustic signals at specific ...
Bad Packets 2017 – A Year in Review

Bad Packets 2017 – A Year in Review

2017 has been another eventful year for denial-of-service attacks. Radware’s ERT team has monitored a vast number of events, giving me ample opportunities to review and analyze attack patterns to gain further ...
Everything You Need to Know About DDoS Attacks

Everything You Need to Know About DDoS Attacks

Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and damaging cyber-attacks. Let’s examine how these attacks have evolved and how ...
My Network has High Cholesterol

My Network has High Cholesterol

5 out of 6 businesses struggle daily with low profile DDoS attacks that consume their bandwidth and resources and pose a burden, resulting in poor service level and customer experience You know ...