Attack Types & Vectors

Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression
Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight alteration, Newton's law can be applied to geopolitics: for every action, there ...

A Conversation with Mark Houpt, CISO of Radware Partner DataBank
One of the many benefits that comes from working at Radware is the opportunity to work with cybersecurity professionals whose empirical experience protecting organizations from cyber threats and attacks presents a treasure ...
What is the W4SP Information Stealer?
Since mid-October, W4SP malware is attacking software supply chains; in this case, it's using Python packages to launch an information stealer. The post What is the W4SP Information Stealer? appeared first on ...

“How will the Uber Breach Verdict Affect the CISO Role in the Future?”
A Uber breach verdict was handed down that could prove highly impactful to CISOs and CSOs in the near and distant future. The post “How will the Uber Breach Verdict Affect the ...

Radware Mitigates 1.1Tbps DDoS Attack
As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of public cloud providers. Last week, this trend played ...

Threat Researchers Live: Ep 19
Pascal Geenens and Daniel Smith discuss recent and notable security events like the Russian/Ukrainian cyber conflict. The post Threat Researchers Live: Ep 19 appeared first on Radware Blog ...

Why Understanding Cyber Criminals Behavior and Tools is Vital
By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created. The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first ...

Radware Threat Researchers Live: Episode 8
In the latest episode of Radware Threat Researchers Live, Pascal Geenens & Daniel Smith take a deep dive into today’s cyber threat landscape. The post Radware Threat Researchers Live: Episode 8 appeared ...

The Issue & Impact of Malspam in the U.S. Elections
Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year. The post The Issue & Impact of Malspam in the U.S ...

How to Respond to a DDoS Ransom Note
The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note. The post How to Respond ...