Browser Anomaly Detection Module: A Technical Overview In our previous blogs, we discussed the overview of machine learning approaches used in Radware Bot Manager and delved into an anomaly detection-based technique for enhancing bot detection. Rakesh Thatha |December 23, 2024
The Paradigm Shift in Software Development Mentoring with AI Tools The rapid advancement of AI tools is reshaping the way software was developed, and with it, the role of mentors and senior developers. AI is not just a productivity tool for developers; it's transforming the way they solve problems, write code, and even learn. Michael Rebello |December 20, 2024
A Look Ahead: Radware Experts Weigh In on 2025 Cybersecurity Trends Radware’s security experts already have their sights set on 2025. See what they are predicting about the cybersecurity industry and the threats that organizations can expect to face next year. Radware |December 19, 2024
HTTP Header Anomaly-based Advanced Behavioural Bot Detection HTTP headers are integral components of web communication. They enable information exchange between clients (e.g., web browsers) and servers, helping the server process requests and the client interpret responses correctly. Amrit Talapatra |December 16, 2024
Unpacking the Technical Framework of Radware Bot Manager’s Adaptive Clustering and Traffic Segmentation Module In one of our previous blog post, we discussed how AI plays a critical role in identifying and mitigating bot attacks. Today, we’re building on that discussion by elaborating on one of our advanced approaches for detecting bots: Radware Bot Manager’s Adaptive Clustering and Traffic Segmentation module. Rakesh Thatha |December 10, 2024
Discover Radware's New Service: Open the Door to Internal Cyberattack Data and Intelligence A few weeks ago, we launched Radware Threat Intelligence service, providing all Radware customers with access to real-time cyberattack data. This invaluable resource is now available to enhance Radware services, helping customers stay ahead of emerging threats, identify the next zero-day vulnerabilities, and drive innovative security solutions. Meir Michaeli |December 05, 2024
Advanced Attacks on Embedded Gen AI Tools and Gen AI Apps – What to Watch For Yes, another blog article about AI and cybersecurity… but it’s a topic that remains crucial. In this article, we’ll explore how generative AI (Gen AI) tools create new attack surfaces and are susceptible to various types of cyber threats. Uri Dorot & Pavan Thatha |December 04, 2024
Applying Design Thinking in Cyber Security Product Development In today’s digital landscape, where cybersecurity threats evolve rapidly and unpredictably, developing security solutions requires more than just technical expertise. Traditional approaches to cybersecurity development often focus on building features to counter threats, but they may overlook an important factor: the user. This is where Design Thinking, a human-centred problem-solving framework, proves invaluable. Michael Rebello |December 03, 2024
Elevating Anomaly-Based Bot Detection via Dynamic Threshold Management In our previous post, we discussed the role of anomaly-based detection in identifying and mitigating sophisticated bot attacks. In this blog, we’re diving deeper into how Dynamic Threshold Management strengthens this approach by offering adaptive, real-time adjustments to detection thresholds. This tool enables a refined and responsive defense against evolving bot attacks, ensuring minimal false positives while maximizing detection accuracy. Rakesh Thatha |November 27, 2024
Radware EPIC-AI: Epic Challenges Met with EPIC AI Capabilities AI has become a prevalent term over the past few years, frequently mentioned in various aspects of the digital landscape. It's no surprise that AI has emerged as a key topic in cybersecurity, featuring prominently in numerous discussions related to threats, defenses, and innovative solutions. Dan Schnour |November 26, 2024
What to Look for in a Business Logic Attack Protection Solution: Securing APIs and Web Applications As businesses increasingly rely on APIs to scale their applications, they face new vulnerabilities like Business Logic Attacks (BLAs). Unlike traditional threats, BLAs exploit an application’s workflows, manipulating legitimate functions to cause harm. Traditional defenses, such as Web Application Firewalls (WAFs) and API protection systems, excel at blocking known technical threats but often fail to detect these subtle manipulations. Understanding this gap is crucial to selecting the right protection solution. Jeremie Ohayon |November 25, 2024
How Bad Bots Are Disrupting Black Friday Sales As we approach Black Friday 2024, e-commerce retailers are bracing for what promises to be one of the biggest online shopping events of the year. However, beneath the surface of anticipated record-breaking sales during this holiday shopping season lies a growing threat that threatens the success of these sales: the increasing sophistication and impact of bad bots. Dhanesh Ramachandran |November 22, 2024