Cyber Monday: A Hacktivist’s Dream Come True?
So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named attacks there are two additional attacks which are scheduled...
View Article2011: Why has Group Anonymous Been So Successful?
As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished on how effective the Group Anonymous attacks have been. Vast majorities of targeted organizations...
View ArticleFrom Defense to Offense – Three Steps to Successful Attack Mitigation
In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions...
View ArticleSecurity: On-Premise or In the Cloud? Radware’s DefensePipe Offers an...
While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud. Now, you can stop considering the pros and cons of an on-premise...
View ArticleStock Exchanges in the Line of Fire
During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks." Based predominantly on my experience as part of...
View ArticleInside the World of Hacker Reconnaissance
The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have...
View ArticleThe Ride from RSA 2014 & Taxi Wars
The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it. The only void I noticed among the technical vendors was addressing the issue of hacktivism. In the...
View ArticleThe End of Windows XP
Windows XP support has ended and there will be no more patches. This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer...
View ArticleCyber Monday: A Hacktivist’s Dream Come True?
So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named attacks there are two additional attacks which are scheduled...
View Article2011: Why has Group Anonymous Been So Successful?
As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished on how effective the Group Anonymous attacks have been. Vast majorities of targeted organizations...
View ArticleFrom Defense to Offense – Three Steps to Successful Attack Mitigation
In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions...
View ArticleSecurity: On-Premise or In the Cloud? Radware’s DefensePipe Offers an...
While most attacks are detected and mitigated on-premise, attacks that require greater scale are diverted and mitigated in the cloud. Now, you can stop considering the pros and cons of an on-premise...
View ArticleStock Exchanges in the Line of Fire
During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks." Based predominantly on my experience as part of...
View ArticleInside the World of Hacker Reconnaissance
The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have...
View ArticleThe Ride from RSA 2014 & Taxi Wars
The RSA Conference was amazing this year — bigger, more robust and crazier than I have ever seen it. The only void I noticed among the technical vendors was addressing the issue of hacktivism. In the...
View ArticleThe End of Windows XP
Windows XP support has ended and there will be no more patches. This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer...
View ArticleAn Overview of DDoS Attacks in Q2 of 2021
We saw a rise in burst attacks and were introduced to new threat actors and hacktivist groups rising from the shadows. The post An Overview of DDoS Attacks in Q2 of 2021 appeared first on Radware Blog.
View ArticleCyber Monday: A Hacktivist’s Dream Come True?
So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named attacks there are two additional attacks which are scheduled...
View Article2011: Why has Group Anonymous Been So Successful?
As we shut the door on 2011 and begin the planning efforts for 2012, I can’t help but be astonished on how effective the Group Anonymous attacks have been. Vast majorities of targeted organizations...
View ArticleFrom Defense to Offense – Three Steps to Successful Attack Mitigation
In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions...
View Article
More Pages to Explore .....