hacktivists

Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression

Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight alteration, Newton's law can be applied to geopolitics: for every action, there ...
A Conversation with Mark Houpt, CISO of Radware Partner DataBank

A Conversation with Mark Houpt, CISO of Radware Partner DataBank

One of the many benefits that comes from working at Radware is the opportunity to work with cybersecurity professionals whose empirical experience protecting organizations from cyber threats and attacks presents a treasure ...

What is the W4SP Information Stealer?

Since mid-October, W4SP malware is attacking software supply chains; in this case, it's using Python packages to launch an information stealer. The post What is the W4SP Information Stealer? appeared first on ...
“How will the Uber Breach Verdict Affect the CISO Role in the Future?”

“How will the Uber Breach Verdict Affect the CISO Role in the Future?”

A Uber breach verdict was handed down that could prove highly impactful to CISOs and CSOs in the near and distant future. The post “How will the Uber Breach Verdict Affect the ...
Radware Mitigates 1.1Tbps DDoS Attack

Radware Mitigates 1.1Tbps DDoS Attack

As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of public cloud providers. Last week, this trend played ...
Russian/Ukrainian cyber conflict, OpIsrael 2022, Is DDoS still a Crime?

Threat Researchers Live: Ep 19

Pascal Geenens and Daniel Smith discuss recent and notable security events like the Russian/Ukrainian cyber conflict. The post Threat Researchers Live: Ep 19 appeared first on Radware Blog ...
Why Understanding Cyber Criminals Behavior and Tools is Vital

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created. The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first ...
Threat Researchers Live

Radware Threat Researchers Live: Episode 8

In the latest episode of Radware Threat Researchers Live, Pascal Geenens & Daniel Smith take a deep dive into today’s cyber threat landscape. The post Radware Threat Researchers Live: Episode 8 appeared ...
The Issue & Impact of Malspam in the U.S. Elections

The Issue & Impact of Malspam in the U.S. Elections

Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year. The post The Issue & Impact of Malspam in the U.S ...
How to Respond to a DDoS Ransom Note

How to Respond to a DDoS Ransom Note

The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note. The post How to Respond ...