Ghosting Bots: The Story of Hoaxcalls Failures The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building… Daniel Smith | May 28, 2020
How to Prepare for Cyber Threats Targeting the Olympics While connectivity provides a better user experience, additional technology and innovation can create a larger attack surface for cybercriminals. Radware | March 13, 2020
The Global Impact of COVID-19 on Markets & the Digital Experience Coronavirus outbreaks are changing the economy, creating disruption across industries. Yaniv Hoffman | March 4, 2020
Emotet Attacks Spread Alongside Fears of Coronavirus Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain. Yaniv Hoffman | February 6, 2020
What You Need to Know About Exploit Kits Exploit kits are prepackaged tool kits containing specific exploits and payloads used to drop malicious payloads onto a victim’s machine.… Radware | July 24, 2019
Attackers Are Leveraging Automation Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven… Radware | January 31, 2019
The Rise in Cryptomining There are four primary motivations for cyberattacks: crime, hacktivism, espionage and war. Setting aside nation-state sponsored groups, the largest faction… Radware | January 29, 2019
5 Ways Malware Defeats Cyber Defenses & What You Can Do About It Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware,… Radware | January 17, 2019
Threat Alert: MalSpam Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are… Daniel Smith | January 10, 2019
10 Most Popular Blogs of 2018 Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we… Radware | December 27, 2018
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed… Pascal Geenens | November 15, 2018
Top Cryptomining Malware. Top Ransomware. In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are… Fabio Palozza | August 21, 2018