What You Need to Know About Exploit Kits Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine.… Radware | July 24, 2019
Can You Crack the Hack? Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? Struggling?… Daniel Smith | April 11, 2019
Anatomy of a Cloud-Native Data Breach Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers.… Radware | April 10, 2019
Are Connected Cows a Hacker’s Dream? Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not,… Mike O'Malley | April 3, 2019
What is a Zero-Day Attack? Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature.… Radware | April 2, 2019
CISOs, Know Your Enemy: An Industry-Wise Look At Major Bot Threats According to a study by the Ponemon Institute in December 2018, bots comprised over 52% of all Internet traffic. While… Abhinaw Kumar | March 21, 2019
Bots 101: This is Why We Can’t Have Nice Things In our industry, the term bot applies to software applications designed to perform an automated task at a high rate… Daniel Smith | March 19, 2019
Adapting Application Security to the New World of Bots In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported… Radware | March 7, 2019
IoT Expands the Botnet Universe In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because… Radware | March 6, 2019
Attackers Are Leveraging Automation Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven… Radware | January 31, 2019
The Rise in Cryptomining There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction… Radware | January 29, 2019
5 Ways Malware Defeats Cyber Defenses & What You Can Do About It Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware,… Radware | January 17, 2019