❌

Reading view

There are new articles available, click to refresh the page.

Are Darknet Take-Downs Effective?

Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs are generally digital perp walks meant to remind the public that agents are doing their job, we have to ask, are they actually solving the problem? Moreover, does the Darknet, specifically Tor, really […]

The post Are Darknet Take-Downs Effective? appeared first on Radware Blog.

Understanding the Darknet and Its Impact on Cybersecurity

By: Radware

The darknet is a very real concern for today’s businesses. In recent years, it has redefined the art of hacking and, in the process, dramatically expanded the threat landscape that organizations now face. So, what exactly is the darknet and why should you care? WHAT IS THE DARKNET? Not to be confused with the deep […]

The post Understanding the Darknet and Its Impact on Cybersecurity appeared first on Radware Blog.

Top 6 Threat Discoveries of 2018

By: Radware

Over the course of 2018, Radware’s Emergency Response Team (ERT) identified several cyberattacks and security threats across the globe. Below is a round-up of our top discoveries from the past year. For more detailed information on each attack, please visit DDoS Warriors. DemonBot Radware’s Threat Research Center has been monitoring and tracking a malicious agent […]

The post Top 6 Threat Discoveries of 2018 appeared first on Radware Blog.

What Should You Do When Your Identity Has Been Compromised?

Almost every day, someone calls me to inquire about how to deal with a compromised identity. It has become so common that I have come to the point of just assuming everyone has had their identity compromised in some way, shape or form after the last few years of large-scale data breaches[1]. In 2018, the […]

The post What Should You Do When Your Identity Has Been Compromised? appeared first on Radware Blog.

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This β€˜readiness’ is a new organizational tax on nearly every employed individual throughout the world. Amazingly enough, attackers have reached a level of […]

The post New Threat Landscape Gives Birth to New Way of Handling Cyber Security appeared first on Radware Blog.

2017 in Review: Your Favorite Posts

By: Radware

Another year has come and gone, full of all sorts of new cyber-attacks and vulnerabilities. Which subjects did our readers find the most fascinating this year? Privacy, open-source tools, and a new botnet threat called Reaper were just a few. Below are the top 10 posts that you kept coming back to: SMB Vulnerabilities – […]

The post 2017 in Review: Your Favorite Posts appeared first on Radware Blog.

Darknet: Attacker’s Operations Room

By: Nir Ilani

Originating from ARPANET back in the 70’s, the Darknet is essentially an overlay network, which applies strong privacy and encryption practices.Β  I am often asked what’s the difference between Surface vs. Deep vs. Dark Web, so let me put it as simply as I can – and then let’s examine their relationship and contribution to […]

The post Darknet: Attacker’s Operations Room appeared first on Radware Blog.

The Evolution of the Dark Web

Darknet markets are nothing new but they have grown considerably in popularity since the highly publicized take down of the Silk Road marketplace in October of 2013. Since then users around the world have flocked to these sites in search of drugs and other illicit services. Due to the high demand and availability for these […]

The post The Evolution of the Dark Web appeared first on Radware Blog.

The Cost of a DDoS Attack on the Darknet

Distributed Denial of Service attacks, commonly called DDoS, have been around since the 1990s. Over the last few years they became increasingly commonplace and intense. Much of this change can be attributed to three factors: 1. The evolution and commercialization of the dark web 2. The explosion of connected (IoT) devices 3. The spread of […]

The post The Cost of a DDoS Attack on the Darknet appeared first on Radware Blog.

❌