The Normalization of DDoS Attacks

In June, I traveled to Israel to attend BsidesTLV and Cyber Week. Both of these events included incredible presentations, workshops, and networking opportunities. They also provided many unique opportunities to discuss research, privacy, and policy on… Continue reading The Normalization of DDoS Attacks

Managing Security Risks in the Cloud

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That’s a problem. If your organization does not have the ability to identify its assets, threats, and vulnera… Continue reading Managing Security Risks in the Cloud

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This cyberattack is an automated bot-based attack It uses automation tools such as cURL and PhantomJS It leverages breached usernames and pas… Continue reading Can You Crack the Hack?

Bots 101: This is Why We Can’t Have Nice Things

In our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I use bots at Radware to aggregate data for intelligence feeds or to automate a repetitive task. I also spend a va… Continue reading Bots 101: This is Why We Can’t Have Nice Things

How Secure Is Your Digital Super Bowl Experience?

Over the last few years I have traveled around the world, researching and watching stadiums digitally evolve from the structures I once knew as a kid. I grew up watching the San Diego Chargers play in what was then called Jack Murphy Stadium and now f… Continue reading How Secure Is Your Digital Super Bowl Experience?

Top 3 Cyberattacks Targeting Proxy Servers

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitato… Continue reading Top 3 Cyberattacks Targeting Proxy Servers

Threat Alert: MalSpam

Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are designed to commit fraud via credential theft by sending MalSpam, malicious spam that contains banking mal… Continue reading Threat Alert: MalSpam

Ad Fraud 101: How Cybercriminals Profit from Clicks

Fraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for today’s malicious actors, which is reflected in the rampant use of identity and financial theft, and ad fraud… Continue reading Ad Fraud 101: How Cybercriminals Profit from Clicks

2018 In Review: Memcache and Drupalgeddon

Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events that highlight the evolution and speed with which attackers will weaponize a vulne… Continue reading 2018 In Review: Memcache and Drupalgeddon