• DDoS Threats & Security Attacks: DDoS Reports & Cyber Security Threats

    New cyber security attacks and DDoS threats are lurking in the shadows everyday. Read the latest information and stay head of these vulnerabilities with updated DDoS reports and cyber security threat reports from Radware's Emergency Response Team (ERT).

    Hajime Botnet – Friend or Foe?


    Hajime is a sophisticated, flexible and future-proof IoT botnet. It is capable of updating itself and provides the ability to extend its member bots with ‘richer’ functions, both efficiently and fast.

    Cyber Attacks on French Election


    As the 2017 French presidential election approaches, many are becoming worried about the possibility of cyber interference in the election process. There is concern that a cyber-attack or social manipulation like those recently seen in the 2016 United States presidential election will occur in the time leading up to the April 23rd election date.

    BrickerBot PDoS Attack: Back With A Vengeance


    A new version of the BrickerBot PDoS attack has been discovered and researched by Radware’s Emergency Response Team.

    ”BrickerBot” Results In PDoS Attack


    Called Permanent Denial-of-Service (PDoS), this form of cyber-attack is becoming increasingly popular in 2017 as more incidents involving this hardware-damaging assault occur.

    OpIsrael 2017


    With the stated goal of "erasing Israel from the Internet,” Anonymous will launch its yearly cyber operation against Israel on April 7, 2017.

    The Need for Internet of Things Security: The Threat is Spreading Like Wildfire


    Since the publication of the Mirai botnet source code, there has been a race to enslave more and more IoT devices by hackers and bot-herders.

    Zyklon HTTP Botnet


    Zyklon HTTP is a botnet that is currently being sold on the Darknet, HackForums and available on a number of member only communities. This botnet supports Tor for anonymization and comes loaded with a number of additional features. It allows its users to execute various types of DDoS attacks, data theft and fraud. It also features secure operation mechanisms to detect other malware and assure its availability.