Types of DDoS Attacks & Tools

Cyber-attacks have reached a tipping point in terms of quantity, length, complexity and targets. Read these short articles to get familiar with today’s most common types of DDoS attacks and tools and learn how to protect against these threats.

The Big 3 Cyber-Attacks Targeting Proxy Servers

As a facilitator of access to content and networks, proxy servers have become a focal point for those seeking to cause grief to organizations via cyber-attacks due to the fallout a successful assault can have. Based on research from Radware’s 2017-2018 Global Application & Network Security Report, here are three types of attacks that organizations can expect to target their proxies.

May 9, 2018 03:00 PM

The Rise of the Botnets: Mirai & Hajime

The Internet of things is fraught with connected devices offering a staggeringly low level of security. Depending on which source is consulted, the number of IoT devices could reach as many as 20 billion by 2020. With hackers using an array of new malware to commandeer these digitized soldiers into botnet armies, it was only a matter of time until hackers unleashed these devices into a massive, distributed DDoS attack.

November 30, 2017 02:00 PM

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion.

August 30, 2017 03:00 PM

Friend Turned Enemy: SSL-Based Cyber-Attacks

SSL-based cyber-attacks are the posterchild for the idiom “a wolf in sheep’s clothing.” A cryptographic protocol turned enemy, SSL improves privacy and integrity, but can also create a blind spot in corporate defenses when hackers leverage it to mask cyber-attacks and malware.

March 27, 2017 03:00 PM

Pick Your Poison: The Most Popular Cyber-Attacks of 2016

As security experts deploy new defenses, hackers develop new attack vectors to counter the countermeasures. The result is a plethora of attack types that, depending on industry trends, rise and fall in popularity. Based on Radware’s 2016 – 2017 Global Application & Network Security Report, this piece outlines the cyber-attacks that proved popular in 2016, and thus sheds light on what to expect in 2017.

March 5, 2017 02:00 PM

Top 10 Cryptoware Types

Locky propagates through spam emails with infected files, and changes all file extensions to .locky.

August 1, 2016 03:00 PM

Pick Your Poison: The Most Popular Cyber Attacks in 2015

Necessity is the mother of invention. That certainly holds true in the world of cyber security. As security professionals have developed new defenses to attack vectors, hackers have developed new tools to counter the countermeasures. The result is a plethora of attack types that, depending on industry trends, rise and fall in popularity throughout the year. Based on research and surveys of over 300 worldwide organizations by Radware, this paper outlines the attack vectors that proved popular in 2015, and thus sheds light on what to expect in 2016.

March 15, 2016 03:00 PM

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center