Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created.
The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first on Radware Blog.
The post … Continue reading Why Understanding Cyber Criminals Behavior and Tools is Vital

The Issue & Impact of Malspam in the U.S. Elections

Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year.
The post The Issue & Impact of Malspam in the U.S. Elections appeared first on Radware Blog.
The post The Issue &amp… Continue reading The Issue & Impact of Malspam in the U.S. Elections

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers.
The post When You Get Breached, So Do Your Customers appeared first on Radware Blog.
The post When You Get Breached, So Do Y… Continue reading When You Get Breached, So Do Your Customers

Emotet Attacks Spread Alongside Fears of Coronavirus

Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain.
The post Emotet Attacks Spread Alongside Fears of Coronavirus appeared first on Radware Blog.
The post Emotet Attacks Spread Al… Continue reading Emotet Attacks Spread Alongside Fears of Coronavirus

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.
The post Nation-State Attacks: Motivations & Consequences appeared first on Radware Blog.
The post Nation-State At… Continue reading Nation-State Attacks: Motivations & Consequences

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here’s what we found.
The post Retailers, How Much of Your Holiday Traffic is Actually Human? appeared first on Radw… Continue reading Retailers, How Much of Your Holiday Traffic is Actually Human?

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.
The post TCP Reflection Attacks: Then and Now appeared first on Radware Blog.
The post TCP Reflection … Continue reading TCP Reflection Attacks: Then and Now

Threat Alert: TCP Reflection Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection attacks, have… Continue reading Threat Alert: TCP Reflection Attacks

Defacements: The Digital Graffiti of the Internet

A defacement typically refers to a remote code execution attack or SQL injection that allows the hacker to manipulate the visual appearance of the website by breaking into a web server and replacing the current website content with the hacker’s … Continue reading Defacements: The Digital Graffiti of the Internet