Application Protection Bringing Cloud-Grade Web DDoS Protection to On-Prem Applications Imagine this: it’s a perfectly normal Thursday morning. The coffee is hot, dashboards are green, and your application is quietly doing its job. No alerts. No calls. No one blaming the network. Everything is perfect and you even start planning your weekend. Dalit Bar |February 04, 2026
Application Protection When Good AI Agents Go Bad: A Cautionary Tale for Modern Organizations In 2025, retail chain BrightMart was riding a wave of optimism. Like many organizations across industries—law firms, insurance companies, logistics providers and customer-facing service companies—it had begun deploying AI agents to accelerate employee productivity, automate repetitive tasks, streamline customer interactions and push overall efficiency to new levels. Dror Zelber |February 03, 2026
Threat Intelligence Meet Daily Digest - The Fastest Way to Turn Cyber Noise into Clear, Actionable Insight In today’s threat landscape, cyberattacks are becoming more frequent and harder to track. According to recent industry reports, the global average cost of a data breach is now around $4.5 million, with even higher costs in highly regulated markets. Noy Cabel |January 27, 2026
Application Protection Radware’s New API Security Service: Unified, End-to-End Protection Built for Real-World APIs APIs are at the core of modern digital experiences, and they’re expanding faster than traditional security approaches can keep up. To address this challenge, Radware’s new API Security Service delivers a unified, end-to-end solution that protects APIs across their entire lifecycle, from discovery and posture management to real-time runtime protection. Uri Dorot |January 19, 2026
Application Protection When Help Turns Harmful: How Attacking a Healthcare LLM Prompt Can Put Patients at Risk Healthcare institutions around the world are adopting AI-driven virtual assistants to improve patient services. Instead of waiting on hold, patients can ask a Large Language Model (LLM) for help with booking appointments, checking lab results, understanding treatment options, managing chronic conditions, or even getting reminders about medication or follow-ups. Dror Zelber |January 14, 2026
Security From Senior Penetration Tester to Product Manager: Evolving from Breaking Systems to Building Them Securely For most of my career, I lived in a world of exploits, payloads, and red-team reports. I spent countless hours trying to break systems, uncover vulnerabilities, and simulate real-world attacks to help organizations strengthen their defenses. Jitesh Sharma |January 13, 2026
Application Protection Unlimited Resources, Unlimited Damage: The Real Cost of Ignoring Unrestricted Resource Consumption vulnerability Imagine your application is an all-you-can-eat restaurant… Most customers take a reasonable amount of food, but one person decides to empty every single tray. David Netanel Mashiah |January 09, 2026
Threat Intelligence ZombieAgent: New ChatGPT Vulnerabilities Let Data Theft Continue (and Spread) We’ve discovered several new vulnerabilities that allow an attacker to exploit ChatGPT to exfiltrate sensitive or personal information. Zvika Babo |January 08, 2026
Application Protection Radware AI SOC Xpert: Elevating Security Operations — A Deep Dive into Its Bot Defense Capabilities In the rapidly evolving world of cybersecurity, automation and data intelligence have become indispensable for defending digital infrastructure. Modern Security Operations Centres (SOCs) process massive volumes of data — including alerts, logs, network telemetry, and user behaviour. Managing and interpreting this information manually is time-consuming and prone to human error. Netravati Hegadi |January 07, 2026
DDoS Protection Capacity Increase For years, DDoS attacks were seen as a familiar challenge. Titles and headlines warned about them, but the approach to defense remained largely the same. That era is over. Eva Abergel |January 06, 2026
DDoS Protection The Rising Challenge of DDoS Attacks on Encrypted Traffic DoS attacks on encrypted traffic are on the rise. SSL/TLS protocols are widely adopted to secure web applications, protect user data, and ensure privacy across the internet. Simcha Stern, Guy Perez |January 05, 2026
Application Protection Fighting AI-Driven Bots Across the Full Attack Lifecycle The bot threat landscape has fundamentally changed, with a new reality that is far more sophisticated than the simple, scripted bots of the past: AI-enhanced bots. Dhanesh Ramachandran |December 23, 2025