IoT Hackers Trick Brazilian Bank Customers into Providing Sensitive Information Radware Threat Research Center has identified a hijacking campaign aimed at Brazilian Bank customers through their IoT devices, attempting to Pascal Geenens |August 10, 2018
Can SNMP (Still) Be Used to Detect DDoS Attacks? SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component Pascal Geenens |August 09, 2018
Consumer Sentiments About Cybersecurity and What It Means for Your Organization Over the past six months, the data breaches against companies such as Panera Bread, Delta Airlines and Sears, and Saks Anna Convery-Pelletier |August 07, 2018
Micropsia Malware Since June 2018, the Radware Threat Research team has monitored an ongoing APT against the Palestinian authority, featuring an updated Yair Tsarfaty |July 25, 2018
Access to Applications Based on a « Driving License » Model More and more countries are modifying their policies with a new “driving license” model.With a classic license model, drivers can Thomas Gobet |July 18, 2018
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10 Looking in the rearview mirrorThe application threat landscape has rapidly evolved. For years, users consumed applications over the internet using Ben Zilberman |July 12, 2018
Security Impacting Humans: Fingerprinting vs. CAPTCHA As all applications need to be both secured and fast, the industry moves towards mitigating bad bots. As nearly 25% Thomas Gobet |June 13, 2018
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty Consumers demand a secure, world-class experience, but when organizations deploy new applications and services to deliver that experience, customer data Anna Convery-Pelletier |June 12, 2018
2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly Carl Herberger |June 05, 2018
Detecting Malware/APT Through Automatic Log Analysis Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the Fabio Palozza |May 23, 2018
Federal CISO: Superhero Needed A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must Carl Herberger |May 16, 2018
Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data Individual research contributed by Adi Raff and Yuval Shapira.On May 3, 2018, Radware’s cloud malware protection service detected a zero-day Radware |May 10, 2018