• Internet of Things or Internet of Threats?

    In more ways than one, IoT botnets transformed cyber security forever. They introduced the industry to the 1Tbps cyber-attack and sophisticated vectors like GRE floods and DNS water torture. Mirai, the 2016 posterchild for bot attacks, rewrote the rules as the world’s first open source botnet that can be customized. Is your organization prepared to detect and mitigate these threats? Is your organization a "botnet" killer? This page provides a series of articles and best practices to provide security experts with everything they need to know about IoT botnets and cyber security.

  • TOP 9 DDoS THREATS YOUR ORGANIZATION MUST BE PREPARED FOR

    Featured Article

    Top 9 DDoS Threats Your Organization Must Be Prepared For


    New & Sophisticated DDoS Attacks Are Happening Daily. Are You Vulnerable?

    As the IoT botnet landscape expands and larger, more destructive threats become inevitable, it’s critical to understand these bot-based assaults. This guide provides an overview of the top 9 DDoS threats your organization must prepare for.

    Read This Featured Article
  • Nefarious bots—including those that exploit Internet of Things (IoT) devices as weapons of attack—are one of the fastest-growing and changing threats in the security landscape. IoT botnets forever changed cybersecurity.”

    Pascal Geenens, Security Evangelist, Radware
  • Top 9 DDoS Threats Your Organization Must Be Prepared For

    DNS Water Torture attacks, SSL floods, ransom DoS assaults, Advanced Persistent DoS and application flood attacks – all are happening today. Is your organization prepared to detect and mitigate these threats? Is your organization a “botnet” killer?

    The Rise of the Botnets: Mirai & Hajime

    The Internet of things is fraught with connected devices offering a staggeringly low level of security. Depending on which source is consulted, the number of IoT devices could reach as many as 20 billion by 2020. With hackers using an array of new malware to commandeer these digitized soldiers into botnet armies, it was only a matter of time until hackers unleashed these devices into a massive, distributed DDoS attack.

    Internet of Threats: IoT Botnets and the Economics of DDoS Protection

    The piece explores the rise of IoT-based cyber-attacks and analyzes the various attack vectors.