Sicurezza

Interview: Open Banking Opens Customer Data to Third Parties

Pubblicato il

Many on-premise applications are being moved to cloud and new applications written natively for cloud. These are more likely to use open APIs to support access control, enable mobile usage and support innovative payment services. As a result, scraping and bot attacks on web-facing applications will continue to increase. Bots will be used to block […]

Sicurezza

2022 Cyber Predictions: Preparing for Future Security Challenges

Pubblicato il

The pandemic and subsequent economic shocks have spawned innovations in technology, including large steps forward in the cloud and edge deployments.  Longtime businesses are reinventing themselves as contactless online-only experiences. According to Radware’s The State of Web Application and API Protection report, 70% of production web applications now run-in cloud environments. This massive shift to […]

Sicurezza

2021 Year in Review: Denial of Service 

Pubblicato il

2021 was a whirlwind of a year for the security industry. In addition to the still ongoing COVID pandemic, threat actors have continued to evolve at an alarming rate throughout the year, pushing the boundaries of the current landscape to new limits and leaving many wondering if we as an industry can keep up with the growing and ever more resourced criminal complex.   We saw criminal […]

Sicurezza

Cyber 2022 Predictions About Open Banking

Pubblicato il

Open banking will push banking institutions to increase cloud and application security The following 2022 open banking predictions by Prakash Sinha, Radware’s technology evangelist and senior director of corporate marketing, were originally published on VMblog.com, December 22, 2021. In 2022, open banking will continue to gain market traction and acceptance in the U.S. as traditional […]

Sicurezza

Five Benefits of Integrating Bot Management with Your CDN

Pubblicato il

As enterprise and consumer websites and applications increasingly migrate to cloud-based infrastructure solutions to obtain benefits such as the ability to easily scale up, as well as their cost advantages and reduced latency, so are essential security tools such as bot management solutions. To better serve their geographically-widening customer base, enterprises are widely adopting solutions […]

Sicurezza

Log4Shell: Critical log4j Vulnerability

Pubblicato il

On December 9, the Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library. The vulnerability could allow a remote attacker to execute arbitrary code on a system with software using the log4j2 Java library to log information and messages. Many software and online services based on […]

Sicurezza

Radware Threat Researchers Live: Ep.16

Pubblicato il

Tune in and watch our special guest Mathieu Huysman, co-founder & COO of Cyrex, an expert penetration tester and ethical hacker share about online game hacking with our hosts Pascal Geenens and Daniel Smith. [embedded content] [Like this post? Subscribe now to get the latest Radware content in your inbox weekly plus exclusive access to […]

Sicurezza

DDOS Attacks Targeting Payment Services of Global Financial Institutions

Pubblicato il

A threat actor or group is actively targeting the online services of branches of global financial institutions with their headquarters located in Europe. Radware Cloud DDoS Protection Services prevented multiple attacks from disrupting online web banking, payment validation services and remote access services of branches of financial institutions in several countries across the globe. Over […]

Sicurezza

Ransomware & Ransom DoS, Why They Are Similar But Different

Pubblicato il

Since 2020, ransomware and ransom denial-of-service (RDoS) have become ubiquitous with ransomware attacks grabbing headlines nearly every week. While ransomware and ransom DoS have a common objective and some of their tactics overlap, their techniques and success rate are quite different, and so is the threat and potential impact for organizations. Over time, as both threats evolved, they have been cross-leveraging reputation and techniques.   Ransomware   Ransomware attacks leverage a crypto-locking malware that destroys systems and makes data inaccessible. Crypto-locking malware needs to be deployed on servers inside the organization. Attackers need to breach the network or a device inside the network and then move laterally across the organization to impact as many systems and lock as […]