Strengthening Online Applications Against Pass-the-Cookie Attacks

Cyber threat actors involved in cloud service attacks use a variety of tactics and techniques, including possible ‘pass-the-cookie’ attacks.
The post Strengthening Online Applications Against Pass-the-Cookie Attacks appeared first on Radware Blog.
The… Continue reading Strengthening Online Applications Against Pass-the-Cookie Attacks

FireEye Hack Turns into a Global Supply Chain Attack

The FireEye hack turned into a global supply chain attack affecting thousands of SolarWinds customers around the world.
The post FireEye Hack Turns into a Global Supply Chain Attack appeared first on Radware Blog.
The post FireEye Hack Turns into a Gl… Continue reading FireEye Hack Turns into a Global Supply Chain Attack

Beware the Security Threats from Remote Working

The rapid move to home working is posing problems for CIOs who want to keep the network secure. Here’s what must happen to protect the network and its data.
The post Beware the Security Threats from Remote Working appeared first on Radware Blog.
The p… Continue reading Beware the Security Threats from Remote Working

Coronavirus: Its Four Most Prevalent Cyber Threats

The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19.
The post Coronavirus: Its Four Most Prevalent Cyber Threats appeared first on Radware Blog.
Th… Continue reading Coronavirus: Its Four Most Prevalent Cyber Threats

Security is on the Verge of a Major Transformation

While the internet can adapt to higher throughputs for richer data and more connected devices,it cannot adapt to the new requirements for lower latency.
The post Security is on the Verge of a Major Transformation appeared first on Radware Blog.
The po… Continue reading Security is on the Verge of a Major Transformation

2020 Predictions: AI, Cloud Breaches & Quantum Computing

What does the cybersecurity landscape hold as we move into 2020?
The post 2020 Predictions: AI, Cloud Breaches & Quantum Computing appeared first on Radware Blog.
The post 2020 Predictions: AI, Cloud Breaches & Quantum Computing appeared firs… Continue reading 2020 Predictions: AI, Cloud Breaches & Quantum Computing

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.
The post Happy Dyn Attack Anniversary! appeared first on Radware Blog.
The post Happy Dyn Attack Anniversary… Continue reading Happy Dyn Attack Anniversary!

Looking Past the Hype to Discover the Real Potential of AI

How can organizations cut through the hype around AI to understand the most important issues they should be addressing? How can they incorporate AI into their security strategies now to take advantage of the technology’s ability to detect and mi… Continue reading Looking Past the Hype to Discover the Real Potential of AI

Hadoop YARN: An Assessment of the Attack Surface and Its Exploits

TL;DR Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed and vulnerable The geographic spread of vulnerable servers and the targets of the attacks is global and concentrated in regions wit… Continue reading Hadoop YARN: An Assessment of the Attack Surface and Its Exploits