Sicurezza

An Overview of DDoS Attacks in Q2 of 2021

Pubblicato il

Unsurprisingly gaming and telecommunication industries experienced the largest attack volumes in Q2. We saw a rise in burst attacks and were introduced to new threat actors and hacktivist groups rising from the shadows.­ The bottom line is cybercriminals are becoming more brazen in their attacks and ransoms. No industry is immune to a cyberattack but […]

Sicurezza

Government Faces Massive DDoS Attacks Following Protests

Pubblicato il

Earlier this year, in a country populated with over 50 million people, a series of protests began due to higher taxes, corruption and a healthcare reform proposed by the government. Although the government authorities had anticipated the protests would be widespread, no one suspected that a massive cyberattack would be launched on multiple assets of the government’s […]

Sicurezza

Why Understanding Cyber Criminals Behavior and Tools is Vital

Pubblicato il

The attack landscape continues to grow rapidly, and with that growth comes the complex challenge of tracking the Tactics, Techniques, and Procedures (TTPs) used by different threat actors. The National Institute of Standards and Technology’s (NIST) Computer Security Resource Center describes TTPs as the behavior of a threat actor; tracking that behavior has become an […]

Sicurezza

Five Common Pitfalls in Application Protection

Pubblicato il

Every year, companies spend a lot of money on the latest security technologies to protect data confidentiality and the user experience. CISOs go for machine learning, automation, orchestration of event analysis and response, and trust the public cloud providers and their system integrator. However, data breaches still occur. 1st pitfall – “I thought a WAF […]

Sicurezza

Top 3 Biggest Blind Spots That Lead to Cloud Data Breaches

Pubblicato il

Moving workloads to the cloud has led organizations (and IT administrators) to lose control over workloads and relinquish many critical aspects of cybersecurity. As a result, what is considered “inside” in an on-premise based world is suddenly “outside” in a publicly-hosted cloud infrastructure. Hackers can have similar access to publicly hosted workloads as IT administrators […]

Sicurezza

How To Achieve Application Protection Behind AWS/Azure CDN

Pubblicato il

Isn’t cloud-native application development exciting? You get to design the perfect CI/CD pipeline with all the latest and greatest tools, optimize resource utilization and time-to-release, and eventually show off to your bosses’ productivity as well as savings. Too awesome! And then comes the security team. Oh no!But wait, there are many solutions out there to […]

Sicurezza

Radware Threat Researchers Live: Episode 12

Pubblicato il

In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss Ransomware, how fast password leaks are tested by malicious actors, Cryptojacking through typosquating packages in PyPI and more! Watch below, episodes stream live the last Thursday of each month! [Like this post? Subscribe now to get the latest Radware content in […]

Sicurezza

Why Inspecting Encrypted Traffic Is A Must

Pubblicato il

What You Don’t See Can Harm You As we emerge from the COVID-19 lockdown, we see a rash of malicious ransomware attacks trying to shut down many sectors of the economy – Colonial Pipeline, J.B.S, C.N.A Financial – for profit. Why? Because crime pays. Even more threatening are the ones we don’t hear about – […]

Sicurezza

DDoS Attacks Against Financial Institutes Resurge in June 2021

Pubblicato il

According to the latest report published by Radware’s Threat Research team, Q1 of 2021 saw an increase in volume of DDoS attacks by 30%. Beyond the sheer volume, technology evolution brings new means of DDoS attacks. The attack techniques are becoming more sophisticated, and the volumes increase. For cyber attackers, no business is too big […]