5 Ways Malware Defeats Cyber Defenses & What You Can Do About It Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, Radware |January 17, 2019
Top 3 Cyberattacks Targeting Proxy Servers Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes Daniel Smith |January 16, 2019
How Cyberattacks Directly Impact Your Brand: New Radware Report Whether you're an executive or practitioner, brimming with business acumen or tech savviness, your job is to preserve and grow Ben Zilberman |January 15, 2019
Ad Fraud 101: How Cybercriminals Profit from Clicks Fraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for Daniel Smith |January 03, 2019
2018 In Review: Memcache and Drupalgeddon Attackers don't just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two Daniel Smith |December 20, 2018
2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past? In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, Daniel Smith |November 29, 2018
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day1065 servers are exposed and Pascal Geenens |November 15, 2018
The Origin of Ransomware and Its Impact on Businesses In previous articles we've mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. Fabio Palozza |October 04, 2018
IoT Botnets on the Rise Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload Daniel Smith |October 02, 2018
The Evolution of IoT Attacks What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect Daniel Smith |August 30, 2018
Can SNMP (Still) Be Used to Detect DDoS Attacks? SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component Pascal Geenens |August 09, 2018
DNS: Strengthening the Weakest Link One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an Radware |August 02, 2018