New Cyber Attack Methods Uncovering Vulnerable Blind-Spots

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through for findings from a cyber security report, published by Radware.

In the face of an ever-evolving cybersecurity landscape, researchers at Radware® (NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, have identified a number of new attack methods representative of today’s increasingly sophisticated and severe distributed denial of service (DDoS) threat. Radware’s 2012 Global Application and Network Security Report highlights server-based botnets and encrypted layer attacks as just two of the new attack tools challenging organizations during DDoS attacks. Most recently, these tactics were leveraged by perpetrators in the attacks against U.S. financial institutions that have been ongoing since September 2012.

Prepared by Radware’s Emergency Response Team (ERT) which actively monitors and mitigates attacks in real-time, the in-depth research report also found that while security organizations have focused their efforts and attention on the pre and post-phases of defense, attackers now launch prolonged attacks that last days or weeks. This has created a vulnerable blind-spot as defenders lack the capabilities and resources to mitigate attacks in the “during” phase which attackers can exploit to their advantage.

“The Radware ERT sees hundreds of DoS/DDoS attacks each year, and we’ve found attacks lasting more than one week have doubled in frequency during 2012,” says Avi Chesla, chief technology officer at Radware. Through empirical and statistical research coupled with front-line experience, our team identified trends that can help educate the security community.

“Through highlighting significant trends found in this report, our goal is to provide actionable intelligence to ensure organizations can better detect and mitigate these threats that plague their network infrastructure,” adds Chesla.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security65-190x128 Tipping the Data Breach Odds in Your Favor

A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach. ...  More >>

Security64-190x128 How to Navigate the Common Pitfalls of Security Policy Management

While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect security policy management basics. ...  More >>

Global16-190x128 Six Ways Open Source Benefits Your Business

In commercial open source, backing from a vendor ensures the availability of product support and lets users know that the product is suited for commercial use, even for non-technical end users. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date