How to Keep APIs Secure from Bot Cyberattacks Application programming interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. Radware | March 22, 2022
Radware Threat Researchers Live: Bots, Botnets & Gaming In the latest episode of Radware Threat Researchers Live, Daniel Smith and Pascal Geenens discuss what's new in botnets. Radware | November 3, 2020
Ghosting Bots: The Story of Hoaxcalls Failures The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building… Daniel Smith | May 28, 2020
More Destructive Botnets and Attack Vectors Are on Their Way If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious… Daniel Smith | October 23, 2019
What You Need to Know About Botnets Botnets comprised of vulnerable IoT devices, combined with widely available DDoS-as-a-Service tools and anonymous payment mechanisms, have pushed denial-of-service attacks… Radware | June 12, 2019
Are Connected Cows a Hacker’s Dream? Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not,… Mike O'Malley | April 3, 2019
Security Pros and Perils of Serverless Architecture Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase… Radware | March 14, 2019
Will We Ever See the End of Account Theft? There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called… David Hobbs | March 12, 2019
Ad Fraud 101: How Cybercriminals Profit from Clicks Fraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for… Daniel Smith | January 3, 2019
Top 6 Threat Discoveries of 2018 Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below… Radware | December 18, 2018
2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past? In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017,… Daniel Smith | November 29, 2018
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed… Pascal Geenens | November 15, 2018