New cyber security attacks and DDoS threats are lurking in the shadows everyday. Read the latest information and stay head of these vulnerabilities with updated DDoS reports and cyber security threat reports from Radware's Emergency Response Team (ERT).
To receive an email notification when ERT threat alerts are posted, click here.
Radware’s threat research has surveyed the cybersecurity landscape related to Jenkins Security Advisory 1641, also known as CVE-2020-2100, and confirm that over 12,000 exposed Jenkins’ servers can easily be abused by an attacker to launch distributed reflective denial-of-service (DrDoS) attacks with an average amplification factor of 3.00.
Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency
Response Team (ERT) have been monitoring and defending against an increasing
number of TCP reflection attacks.
Over the last week, Radware’s Emergency Response Team (ERT) has been tracking an emerging global ransom denial of service (RDoS) campaign from a group identifying itself as the Russian cyber espionage group, Fancy Bear.
As Super Bowl LIII approaches, Radware’s Emergency Response Team (ERT) research team turns its attention to the crowds and the target-rich environments created by high profile sporting events.
Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States.
Radware Threat Research Center is monitoring and tracking a malicious agent that is leveraging a Hadoop YARN unauthenticated remote command execution in order to infect Hadoop clusters with an unsophisticated new bot that identifies itself as DemonBot.
Over the last few weeks, Radware has been tracking a credential
stuffing campaign targeting the financial industry in the United States and
Europe. Credential stuffing is an emerging
threat in 2018 that has continued to accelerate over the past month as more
breaches occur. Today, a breach doesn’t
just impact the compromised organization and its users, but it also affects every
other website that the users may use.