Learn from Experts

  • How do SSL attacks work? What are the network elements who fall first when under attack? What are counter attacks? How do you track hackers? How can a single hacker bring down a server without flooding it? In the "Learn from the experts" section, we offer intuitive yet technical answers to network and application security related questions to help you learn, understand and get prepared with attack threats.

  • HTTP Flood Attack
    HTTP Flood attacks are becoming very popular attacks on online services, however they are hard to detect and to mitigate.
    Stop Sophisticated Attack Campaigns
    An increase in advanced and persistent DoS and DDoS attack campaigns emerged forcing organizations to change their defense strategy.
    Radware’s APT Score
    Radware’s Advanced Persistent Threat score measures the length of the campaign, number of attack vectors involved and the complexity of each attack vector in order to help companies mitigate against current campaigns.
    HTTP Flood Attack
    HTTP Flood attacks are becoming very popular attacks on online services, however they are hard to detect and to mitigate.
    R-U-Dead-Yet, RUDY DDoS Attack Tool
    RUDY is a low and slow DoS attack tool. It targets web servers with hard to detect, lethal HTTP POST byte-by-byte requests and efficiently depletes the servers’ resources.
    Slowloris DDoS Attack Tool
    The first known slow rate attack tool Slowloris, is a powerful DoS weapon targeting web servers with incomplete low and slow HTTP GET requests that exhausts the web servers’ resources.
    DNS Amplification Attack
    Attackers are taking advantages of weaknesses in the DNS protocol in order to launch a high bandwidth sophisticated attack on their victim using amplification effects.
    THC-SSL-DOS Attack Tool
    An SSL session starts with an SSL handshake where the client and the server negotiate the SSL key. In a TCH-SSL-DOS attack, the client repeatedly asks for a key renegotiation, a costly operation that exhausts the server’s resources.
    DDoS Explained
    What is DDoS? How does it impact my business? How does a DDoS attack occur? This short video explains Distributed Denial of Service (DDoS) attacks and helps you understand the power of such attacks.
    Optima bot
    Optima is a malware that turns computers into bots which become part of a bot army that launches DDoS attacks against websites. It is powerful and has the ability to launch hundreds of attacks at a time using different attack vectors.
    Counterattacks: Changing the Dynamics of a Cyber a
    Cyber attacks are becoming even more sophisticated and traditional defenses are not always sufficient. With counterattacks, the defenders are able to reach out to the attackers, discourage them, slow the attacks down and eventually stop them.