Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s malware protection service detected a zero-day malware threat at one of its customers, a global manufacturing firm, by using machine-learning algorithms. Th… Continue reading Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

The Mikrotik RouterOS-Based Botnet

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new propagating botnet exploiting vulnerabilities i… Continue reading The Mikrotik RouterOS-Based Botnet

A Quick History of IoT Botnets

The Internet of Things (IoT) describes a world where just about anything is an Internet-enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These de… Continue reading A Quick History of IoT Botnets

New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Overview On February 8th, 2018, Radware’s Deception Network detected a significant increase in malicious activity over port 8080. Further investigation uncovered a new variant of the Satori botnet capable of aggressive scanning and exploitation … Continue reading New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers

Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

The retail industry is undergoing a transformative period as the “empowered” consumer, driven by technological advances and breakthroughs, impacts how retailers market, communicate and sell. Retailers continue to erode the barrier to purch… Continue reading Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

Ransomware, Automation, and IoT Bots, Oh My!

Happy New Year to all our readers! In 2017, we conducted several studies and wrote several reports on the state of cyber security.  Let’s take a look at how 2017 shaped up: How Lucrative is Confidential Data? Prime Bounty for Hackers, Top C… Continue reading Ransomware, Automation, and IoT Bots, Oh My!

The Radware Research Roundup

As 2017 comes to a close, we decided to take a look back at a number of new attack types and threats that we saw throughout the year. Our team took a deep dive into researching and testing many of these threats to find out how they operate and how big… Continue reading The Radware Research Roundup

2017 in Review: Your Favorite Posts

Another year has come and gone, full of all sorts of new cyber-attacks and vulnerabilities. Which subjects did our readers find the most fascinating this year? Privacy, open-source tools, and a new botnet threat called Reaper were just a few. Below ar… Continue reading 2017 in Review: Your Favorite Posts