Sicurezza

Accessing Your Crypto Wallet Through Android Devices?

Pubblicato il

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming to note that cyber criminals deploy malicious APKs that are delivered through SMS spam and cryptocurrency miners into people’s mobile devices […]

Sicurezza

Battling Cyber Risks with Intelligent Automation

Pubblicato il

Organizations are losing the cybersecurity race. Cyber threats are evolving faster than security teams can adapt. The proliferation of data from dozens of security products are outpacing the ability for security teams to process it. And budget and talent shortfalls limit the ability for security teams to expand rapidly. The question is how does a […]

Sicurezza

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

Pubblicato il

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper and discuss its patterns of invasions. As people keep talking about how cybercriminals used the banking Trojan Trickbot to steal Coinbase users’ credentials, […]

Sicurezza

5 Must-Have DDoS Protection Technologies

Pubblicato il

Distributed Denial of Service (DDoS) attacks have entered the 1 Tbps DDoS attack era. However, Radware research shows that DDoS attacks are not just getting bigger; they’re also getting more sophisticated. Hackers are constantly coming up with new and innovative ways of bypassing traditional DDoS defenses and compromise organizations’ service availability. Online security providers are […]

Sicurezza

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

Pubblicato il

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world. Amazingly enough, attackers have reached a level of […]

Sicurezza

Stresspaint Malware Campaign Targeting Facebook Credentials

Pubblicato il

On April 12, 2018, Radware’s threat research group detected malicious activity via internal feeds of a group collecting user credentials and payment methods from Facebook users across the globe. The group manipulates victims via phishing emails to download a painting application called ‘Relieve Stress Paint.’ While benign in appearance, it runs a malware dubbed ‘Stresspaint’ […]

Sicurezza

The Mikrotik RouterOS-Based Botnet

Pubblicato il

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new propagating botnet exploiting vulnerabilities in their RouterOS operating system, allowing attackers to remotely execute code on the device. Such devices have been making […]

Sicurezza

Putinstresser.eu, a Simple and Powerful Booter and Stresser Service

Pubblicato il

Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service. Putinstresser.eu is a fairly recent player, an addition to the growing number of low-priced DDoS-as-a-Service, commonly known as booters and stressers, services. The site illustrates the maturity and the ease of access these […]

Sicurezza

Choosing the Right DDoS Solution – Part I: On-Prem Appliance

Pubblicato il

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attacks. However, DDoS protection is not a one-size-fits-all fixed menu; rather, it is an a-la-carte buffet of multiple choices. Each option has its unique advantages and drawbacks, and it is up to the […]

Sicurezza

Entering into the 1Tbps Era

Pubblicato il

Background On February 27th Radware noticed an increase in activity on UDP port 11211. As other organizations began to disclose a trend in UDP amplified attacks over UDP port 11211, Radware’s ERT Research team and the Threat Research Center began preparing for the inevitable. With a Bandwidth Amplification Factor (BAF) ranging between 10,000x and 52,000x, […]