What You Need to Know About Exploit Kits [Video] Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim's machine. Radware |July 24, 2019
Can You Crack the Hack? Let’s play a game. Below are clues describing a specifictype of cyberattack; can you guess what it is?This cyberattack is Daniel Smith |April 11, 2019
Anatomy of a Cloud-Native Data Breach Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. Radware |April 10, 2019
Are Connected Cows a Hacker's Dream? Humans aren’t the only ones consumed with connected devicesthese days. Cows have joined our ranks.Believe it or not, farmers are Mike O'Malley |April 03, 2019
What is a Zero-Day Attack? Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature. Radware |April 02, 2019
CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While Abhinaw Kumar |March 21, 2019
Bots 101: This is Why We Can't Have Nice Things In our industry, the term bot applies to software applications designed to perform an automated task at a high rate Daniel Smith |March 19, 2019
Adapting Application Security to the New World of Bots In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported Radware |March 07, 2019
IoT Expands the Botnet Universe In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because Radware |March 06, 2019
Attackers Are Leveraging Automation Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven Radware |January 31, 2019
The Rise in Cryptomining There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction Radware |January 29, 2019
5 Ways Malware Defeats Cyber Defenses & What You Can Do About It Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, Radware |January 17, 2019