Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Radware Releases Q3 DDoS and Application Attack Report

Blocked DDoS events up 75% in the first nine months of 2021 compared to 2020

Radware, a leading provider of cyber security and application delivery solutions, has published results from its Q3 DDoS and Application Attack Report. The report provides an overview of the DDoS attack landscape, application attack developments, and u********** network scanning trends. The data for the report analyzes network and application attack activity sourced from Radware’s cloud and managed services, and Radware’s Global Deception Network.

PREDICTIONS-SERIES-2022“More DDoS attacks were blocked during the first nine months of 2021 than all of 2020,” said Pascal Geenens, director of threat intelligence for Radware. “During the third quarter, DDoS records for large volumetric attacks were broken across three continents. At the same time, phantom floods, or micro attacks that typically fly below the radar, increased. The reality is organizations need more granular detection and multi-layer defenses to protect against stealthier and more complex DDoS attacks.”

Recommended AI News: SAP Sales Cloud And Microsoft Teams Help Businesses Grow By Removing Barriers To Remote Selling

DDoS Attacks Rise
Yearly trends:
The number of malicious events blocked by Radware’s DDoS mitigation solution was up 75% during the first nine months of 2021 compared to the same period in 2020. And the total volume blocked in the first nine months of 2021 was 44% higher than the same period in 2020.

Quarterly trends:
Although the total number of events per company for the third quarter was slightly below previous quarters in 2021, the number stayed above the highest quarterly level recorded in 2020.

Industry trends:
The most attacked industry in the third quarter was technology, with an average of 2,638 attacks per company, followed by healthcare (1,785 attacks per company), communications (1,525 attacks per company), and finance (1,337 attacks per company).

Web Application Attacks Double
Yearly trends:
Web application attacks based on known vulnerabilities and techniques are ramping up quickly. The number of blocked web security events per company doubled every quarter for the first three quarters of 2021.

Related Posts
1 of 40,645

Quarterly trends:
The third quarter of 2021 accounted for 2.1 million blocked security events per company per quarter, or an average of 700,000 blocked security events per month per company.

Predictable resource location attacks, the most important security violation in the third quarter, was witnessed twice as often as SQL injection, the second-most violation, followed by code injection attacks and cross-site scripting attacks. The top two violations reported in the third quarter are aligned with the top web application security concerns as reported in the OWASP Foundation’s recently published 2021 top 10 list.

Industry trends:
In the third quarter of 2021, the most attacked industry was banking and finance, which accounted for almost 23% of blocked web security events, followed by government (16%), technology (15%), and retail and wholesale trading (12%).

Recommended AI News: IBM Study: C-Suite Executives Declare One Vendor Approach to Cloud is Dead

U********** Network Scanning and Attack Activity Surges
Quarterly trends:
Third quarter u********** scanning activity as recorded by Radware’s Global Deception Network peaked at 27 million events per day, representing the second highest level during 2021.

According to Geenens, “Network scanning and attack activity was marked by opportunistic and random scanning that constitutes a large part of the vulnerability and exploit threat landscape. Malicious actors continuously leverage old and freshly disclosed vulnerabilities such as remote command execution and command injection exploits that are easy to integrate into existing malware and exploit tools. Along with the evolution in cloud resources and services, there is no more hiding on the internet. Every deep corner of the internet gets inventoried in convenient IoT search engines.”

Recommended AI News: Boost.ai Expands US Market Presence, Appoints Bill Schwaab VP North America

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.