Application Protection When Help Turns Harmful: How Attacking a Healthcare LLM Prompt Can Put Patients at Risk Healthcare institutions around the world are adopting AI-driven virtual assistants to improve patient services. Instead of waiting on hold, patients can ask a Large Language Model (LLM) for help with booking appointments, checking lab results, understanding treatment options, managing chronic conditions, or even getting reminders about medication or follow-ups. Dror Zelber |January 14, 2026
Security From Senior Penetration Tester to Product Manager: Evolving from Breaking Systems to Building Them Securely For most of my career, I lived in a world of exploits, payloads, and red-team reports. I spent countless hours trying to break systems, uncover vulnerabilities, and simulate real-world attacks to help organizations strengthen their defenses. Jitesh Sharma |January 13, 2026
Application Protection Unlimited Resources, Unlimited Damage: The Real Cost of Ignoring Unrestricted Resource Consumption vulnerability Imagine your application is an all-you-can-eat restaurant… Most customers take a reasonable amount of food, but one person decides to empty every single tray. David Netanel Mashiah |January 09, 2026
Threat Intelligence ZombieAgent: New ChatGPT Vulnerabilities Let Data Theft Continue (and Spread) We’ve discovered several new vulnerabilities that allow an attacker to exploit ChatGPT to exfiltrate sensitive or personal information. Zvika Babo |January 08, 2026
Application Protection Radware AI SOC Xpert: Elevating Security Operations — A Deep Dive into Its Bot Defense Capabilities In the rapidly evolving world of cybersecurity, automation and data intelligence have become indispensable for defending digital infrastructure. Modern Security Operations Centres (SOCs) process massive volumes of data — including alerts, logs, network telemetry, and user behaviour. Managing and interpreting this information manually is time-consuming and prone to human error. Netravati Hegadi |January 07, 2026
DDoS Protection Capacity Increase For years, DDoS attacks were seen as a familiar challenge. Titles and headlines warned about them, but the approach to defense remained largely the same. That era is over. Eva Abergel |January 06, 2026
DDoS Protection The Rising Challenge of DDoS Attacks on Encrypted Traffic DoS attacks on encrypted traffic are on the rise. SSL/TLS protocols are widely adopted to secure web applications, protect user data, and ensure privacy across the internet. Simcha Stern, Guy Perez |January 05, 2026
Application Protection Fighting AI-Driven Bots Across the Full Attack Lifecycle The bot threat landscape has fundamentally changed, with a new reality that is far more sophisticated than the simple, scripted bots of the past: AI-enhanced bots. Dhanesh Ramachandran |December 23, 2025
Application Protection From Cutting-Edge to Critical Risk: Unpacking the Cybersecurity Dangers of LLM Integration - Part 2: Defending at the Inline Edge In Part 1, we explored how integrating large language models (LLMs) into business applications creates new and often misunderstood security exposures - from prompt injection and data leakage to brand impersonation and compliance risks. Rotem Elharar |December 16, 2025
Threat Intelligence 2026 Cybersecurity Forecast: Six Expert Predictions Worth Paying Attention To As we roll toward 2026, we asked a few of Radware’s sharpest minds to weigh in on what’s on the horizon for cybersecurity next year. Radware |December 15, 2025
Threat Intelligence Was it Aisuru? The reality of DDoS Attack Attribution Right now, Aisuru dominates the headlines due to several record-breaking attacks being attributed to it. As a result, any DDoS incident above 1 Tbps inevitably prompts the same question: “Was it Aisuru?” Pascal Geenens |December 10, 2025
Threat Intelligence Synthetic Vulnerabilities: Why AI-Generated Code is a Potential Structural Security Crisis Recent studies show a rapid rise in AI-assisted development: in 2024-2025, between 25% and 35% of newly written code in large organizations is already influenced or partially generated by LLMs. Ori Meidan |December 09, 2025