The Cloud Path – Rerouting Traffic in Peacetime Solves some Cyber-Attack Risk, Creates Others Last month, I wrote about some inherent challenges with the increasingly popular cloud-only model for cyber-attack mitigation. As a reminder,… Ben Desjardins | October 22, 2015
DDoS Fire & Forget: PDoS – A Permanent Denial of Service You no longer have to don an X-wing fighter or take a sledgehammer to a network to make the environment… Carl Herberger | October 16, 2015
Evolved Cyber-Attacks Target Banks and Mis-Direct Their Network Protection For many years banks have been a prime target for cyber-attacks. As of late though, publicly-known cyber-attacks in the financial… Werner Thalmeier | October 13, 2015
What Does the Volkswagen Hack mean for IoT Security? A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts… Werner Thalmeier | October 1, 2015
Portmapper is Preying on Misconfigured Servers to Amplify Attacks In the constantly evolving threat landscape attackers are always finding new ways to target their victims. In the last few… Daniel Smith | September 24, 2015
How the German Government’s Network Was Breached – And Why It Could Happen To You The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown… Werner Thalmeier | September 22, 2015
How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel… Louis Scialabba | September 16, 2015
Reverse Engineering a Sophisticated DDoS Attack Bot Not long ago, the Radware Emergency Response Team (ERT) noticed significant and increased usage of the Tsunami SYN Flood attack… Yotam Ben-Ezra | August 5, 2015
DDoS-For-Hire: A Full Blown Market DDoS-for-hire has been around for a while. Until recently, “booters” were known as paid online services used by gamers to… Yotam Ben-Ezra | July 23, 2015
Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks Modern cyberattacks are sophisticated and are often launched over long periods of time. The complexity of these attack campaigns can… Yotam Ben-Ezra | March 3, 2015
Can a CDN Stop Cyber-Attacks? In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have… David Hobbs | February 26, 2015