Quantcast
Channel: malware – Radware Blog
Browsing all 40 articles
Browse latest View live

From SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities...

Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past month, emerging as the most advanced...

View Article



The Malware Update: A Look at the Latest Malware That’s Attacking Business...

Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the secure platform myths have been busted, we have...

View Article

From Defense to Offense – Three Steps to Successful Attack Mitigation

In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions...

View Article

The New Social Security: How Social Media is Changing the Cyber Security...

From our personal to our professional lives, today most of us use social media in one form or another. Till now, the majority of organizations have focused primarily on the best ways to use social...

View Article

Inside the World of Hacker Reconnaissance

The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have...

View Article


Image may be NSFW.
Clik here to view.

The End of Windows XP

Windows XP support has ended and there will be no more patches. This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer...

View Article

Image may be NSFW.
Clik here to view.

Cyber Attacks on Oil and Gas

A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a Russian hacking group and it targeted oil, gas, power, and...

View Article

Image may be NSFW.
Clik here to view.

Is Your Home (Network) Haunted? The Threats of the Ghost Vulnerability and...

Recent vulnerabilities have surfaced that have opened up interesting debates and spirited discussions regarding what I see as vulnerabilities in embedded Linux systems.  Devices that are considered...

View Article


Image may be NSFW.
Clik here to view.

Cyber-Security Concerns to Know Before You Sign On

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. Any of us who use the Internet with regularity enjoy the benefits of Federated Identity...

View Article


Image may be NSFW.
Clik here to view.

5 Reasons Why Virtual Machine Security Could Become a Larger Threat

The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! What is happening now that is causing us to just get around to finding...

View Article

Cyber Attack Marketplace: Where, How, and Why of Purchasing an Attack

Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at an alarming rate. Part of this growth can be...

View Article

Malware and Botnet Attack Services Found on the Darknet

Over the last several months we have explored a number of attack marketplaces along with the different tools and services offered on the Darknet. In this post we are going to take a deeper look at the...

View Article

IPv6 Security Today

According to Google Statistics, we are only at around 15% adoption of Internet Protocol version 6 (IPv6) worldwide.  Because of the low adoption rate today, have we really even scratched the surface on...

View Article


The Shadow Brokers went dark, the NSA weakened and exposed in the cyber war

On January 12th, the Shadow Brokers announced they are ‘going dark’ by leaving a farewell: “So long, farewell peoples. TheShadowBrokers is going dark, making exit. Continuing is being much risk and...

View Article

“For Educational Purposes Only”

Education, freedom and knowledge. These are the pillars for higher learning, but have often been used to describe some open source projects and services that have the potential to be abused by those...

View Article


Image may be NSFW.
Clik here to view.

Everything You Need to Know About Brickerbot, Hajime, and IoT Botnets

By now you have probably heard about Brickerbot, Hajime, and the growing problem of Internet of Things (IoT) botnets. This round-up will provide you with a number of comprehensive resources to bring...

View Article

Image may be NSFW.
Clik here to view.

SMB Vulnerabilities – WannaCry, Adylkuzz and SambaCry

Last month on Friday, May 12th a global incident related to a ransomware variant named WannaCry broke out, targeting computers around the world. Everything from personal computers to corporate and...

View Article


Image may be NSFW.
Clik here to view.

CodeFork hackers fooled many security solutions. How about yours?

As a result of Radware’s recent acquisition of Seculert, the startup that developed machine-learning algorithms that are capable of detecting and blocking zero-day malwares in cloud environments,...

View Article

Image may be NSFW.
Clik here to view.

JenX – Los Calvos de San Calvicie

A new botnet recently started recruiting IoT devices. The botnet uses hosted servers to find and infect new victims leveraging one of two known vulnerabilities that have become popular in IoT botnets...

View Article

Image may be NSFW.
Clik here to view.

You Need a New Approach to Stop Evasive Malware

Evasive malware has become a key threat to businesses’ sensitive data. Stealing and selling sensitive data on the Darknet is a lucrative business for hackers, who increasingly rely on evasive malware...

View Article
Browsing all 40 articles
Browse latest View live




Latest Images