OpIsrael 2017

Ideology, politics and religious differences are at the core of operation OpIsrael. OpIsrael is launched by Anonymous with the stated goal of “erasing Israel from the internet” in protest against the Israeli governments’ conduct in the Israeli- Palestinian conflict. This is a yearly operation and was created in 2012. It starts every year on April […]

The post OpIsrael 2017 appeared first on Radware Blog.

Continue reading OpIsrael 2017

The Expansion of IoT since Mirai.

The idea of an Internet of Things (IoT) botnet is nothing new in our industry. In fact, the threat has been discussed for many years by security researchers. It has only now gained public attention due to the release and rampage of the Mirai botnet. Since Mirai broke the 1Tbps mark in late 2016 the […]

The post The Expansion of IoT since Mirai. appeared first on Radware Blog.

Continue reading The Expansion of IoT since Mirai.

Don’t Fall Into the Ring of Fire

The Ring of Fire map from Radware tracks vertical markets based on the likelihood that organizations in these sectors will experience an attack. The Ring of Fire reflects five risk levels ranging from a low likelihood of an attack to a high likelihood. As sectors move closer to the red center, organizations in these sectors […]

The post Don’t Fall Into the Ring of Fire appeared first on Radware Blog.

Continue reading Don’t Fall Into the Ring of Fire

Don’t Fall Into the Ring of Fire

The Ring of Fire map from Radware tracks vertical markets based on the likelihood that organizations in these sectors will experience an attack. The Ring of Fire reflects five risk levels ranging from a low likelihood of an attack to a high likelihood. As sectors move closer to the red center, organizations in these sectors […]

The post Don’t Fall Into the Ring of Fire appeared first on Radware Blog.

Continue reading Don’t Fall Into the Ring of Fire

“For Educational Purposes Only”

Education, freedom and knowledge. These are the pillars for higher learning, but have often been used to describe some open source projects and services that have the potential to be abused by those that are not so innocent. Over the last two years, tools like stressers, Remote Administration Tools (RAT) and ransomware have been published […]

The post “For Educational Purposes Only” appeared first on Radware Blog.

Continue reading “For Educational Purposes Only”

Internet Censorship / Open Internet

Earlier this month my colleague Carl Herberger wrote a blog post regarding how the internet was rolling back our freedoms. I would agree with him. As time moves forward, we are seeing more situations where no one can hide from their government as the internet closes around them. An open internet as we know it […]

The post Internet Censorship / Open Internet appeared first on Radware Blog.

Continue reading Internet Censorship / Open Internet

2016 Attack Trends

2016 has been an eventful year when it comes to denial of service attacks. This year the industry as a whole has seen the largest attacks ever, and new attack vectors designed to test and challenge modern day defenses. Every year Radware’s ERT sees millions of attacks and our ERT Researchers throughout the year are […]

The post 2016 Attack Trends appeared first on Radware Blog.

Continue reading 2016 Attack Trends

How To Buy Bitcoin

First, what is Bitcoin and where did it come from? Bitcoin (BTC) is a cryptocurrency payment system based off of the blockchain, a core component of the digital currency. The blockchain was introduced by a pseudonymous creator, Satoshi Nakamoto, in 2008 and open sourced for the currency in 2009. The blockchain serves as a public […]

The post How To Buy Bitcoin appeared first on Radware Blog.

Continue reading How To Buy Bitcoin

Social Engineering

Social Engineering is a process of psychological manipulation, more commonly known in our world as human hacking. The sad reality behind Social Engineering is it is very easy to do. In fact, it’s so easy that even a teenager can do it and destroy your company, all on a Friday night. The goal is to […]

The post Social Engineering appeared first on Radware Blog.

Continue reading Social Engineering

Profile of a Hacker

As the hacktivist community continues to grow and evolve, so do the tools and services at a hacker’s disposal. The digital divide between skilled and amateur hackers continues to grow. This separation in skill is forcing those with limited knowledge to rely solely on others who are offering paid attack services available in marketplaces on […]

The post Profile of a Hacker appeared first on Radware Blog.

Continue reading Profile of a Hacker