Radware Threat Researchers Live: Ep.13 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith dive into how censorship middleboxes can be Radware |September 10, 2021
Radware Threat Researchers Live: Ep.15 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the following:Ransom DoSREvil vs Voice providersCursed Radware |October 28, 2021
Radware Threat Researchers Live: Ep.14 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the following:. The Return of REvil. Radware |October 12, 2021
Introducing Radware’s New Threat Intelligence Service: Real Time Data at Your Fingertips In today’s rapidly evolving digital landscape, cybersecurity has become a paramount concern for organizations worldwide. Security Operations Center (SOC) engineers are constantly grappling with blocked IP addresses lacking clear context, suspicious sources, and the daunting task of managing multiple incidents simultaneously. Eva Abergel |October 07, 2024
Why The Biggest Cyberattacks Happen Slowly We’ve all seen this scene in some movie or TV show: a hacker sits in a shadowy room busily typing Eyal Arazi |October 07, 2021
Ransomware & Ransom DoS, Why They Are Similar But Different Since 2020, ransomware and ransom denial-of-service (RDoS) have become ubiquitous with ransomware attacks grabbing headlines nearly every week. W Pascal Geenens |November 30, 2021
The Latest in Cybersecurity: How Radware’s Threat Intelligence Powers Proactive Protection In the high-stakes world of cybersecurity, staying ahead of emerging threats is essential. With attackers constantly evolving their tactics, businesses need more than just reactive defenses—they need proactive, adaptable strategies that stay one step ahead. Radware’s threat intelligence solutions empower organizations to detect and mitigate risks before they become full-blown attacks, leveraging advanced AI, real-time data analysis, and expert insights. Vladislav Bukin |November 20, 2024
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the Daniel Smith |November 18, 2022
"Sky Aid" Cyber Campaign: A Looming Threat Following the Credit Guard DDoS Attack Last Sunday started like any other day, but things took a dramatic turn by noon. Reports began pouring in about payment systems across Israel acting up. Customers at cafes waited impatiently as their transactions lagged. Shoppers at Super-Pharm stood in long queues, frustrated by checkout delays. Even Israel's national airline, El Al, was not spared. What was happening? Arik Atar |November 13, 2024
Are Offensive Cyber Campaigns Gaining Traction? Over the last few years, there has been an ongoing debate surrounding the topic of hacking back. While this is a mixed Daniel Smith |November 09, 2021
Cybercriminals Use Automation, Here is Why You Should Too We’ve all heard about the CapitalOne breach. It dominated headlines for weeks and is a prime example of how even the largest and Eyal Arazi |November 04, 2021
OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows OverviewAfter a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities Pascal Geenens |November 02, 2022