Threat Intelligence Deconstructing the Cashout Attack Kill Chain: Five Overlooked Indicators Statistically speaking, the vast majority of malicious bot attacks across the web are driven by credential stuffing attacks, as threat actors use breached credentials to take over accounts of credential-recycling users. Arik Atar |November 24, 2025
DDoS Protection Introducing Policy Editor – Simplifying DDoS Policy Management Managing DDoS security configurations across multiple assets has always been a balancing act - between efficiency, accuracy, and control. Lena Frid |November 21, 2025
Application Protection Inside the Cloudflare Global Outage: What Happened and Why a Dual Strategy Matters On November 18, 2025, a major Cloudflare outage disrupted significant parts of the global internet for several hours. Websites protected by Cloudflare began returning widespread HTTP 5xx errors. Dan Schnour |November 20, 2025
Application Protection Introducing Radware’s AI-Enhanced SOC Xpert – From Recommendation to Remediation In Part 1, we explored how modern DDoS threats evolve rapidly and why traditional dashboards—though full of data—struggle to provide SOC teams with real-time context. Lena Frid |November 19, 2025
Application Protection Top 5 LLM Security Risks Every Business Must Address The adoption of large language models (LLMs) is revolutionizing how businesses operate, from automating customer support to accelerating content creation and data analysis. These models offer unprecedented efficiency and personalization, giving companies a competitive edge and enhancing customer experiences. Dror Zelber |November 18, 2025
Application Protection API Discovery: The First Step to Securing Your Application Ecosystem APIs are the lifeblood of modern digital infrastructure—connecting applications, services, and data across cloud-native environments. Uri Dorot |November 13, 2025
DDoS Protection When DDoS Meets Agentic AI: How Autonomous Bots Amplify Volumetric Attacks AI-driven botnets are rewriting the rules of DDoS warfare - making attacks adaptive, intelligent, and dangerously fast. Itay Raviv |November 12, 2025
Application Protection Understanding Modern Fake Account Creation Attacks Fake account creation has always been a persistent challenge for platforms with user registration workflows. Unlike login pages or transaction flows that require existing credentials, account creation workflows are intentionally open and accessible, making them ideal targets for bot attacks. Dhanesh Ramachandran |November 07, 2025
Threat Intelligence Belgium in the Crosshairs: Russia’s Hybrid Pressure Campaign Over NATO’s Capital Belgium – host to NATO HQ, SHAPE, the EU Commission, and one of Europe’s densest intelligence ecosystems – sits at the geopolitical center of Western defense and policymaking. Pascal Geenens |November 06, 2025
Application Protection Enabling High-Performance Applications with Advanced Ingress Networking in Kubernetes This blog explores how to optimize ingress networking in Kubernetes for high-performance applications using technologies like OVS, OVS-DPDK, SR-IOV, and PCI Passthrough. Saar Meir |November 05, 2025
Application Delivery Transforming Alteon Support with AI-Powered Support-File Analysis - Part 2 This article explores some of the key challenges and design decisions that went behind building an enterprise-grade Retrieval-Augmented Generation (RAG) (Zhao et al. 2024) solution to support Alteon TSDMP analysis and transform a resource intensive and expertise-heavy analysis process into a fully automated, 10-minute workflow that delivers expert-level insights. Arnab Chatterjee |October 30, 2025
Application Protection Language is the new interface: why prompting is becoming a core security skill In our recent post, Fighting AI with AI, we discussed why security teams must build AI literacy to stay ahead of adversaries. The next step is putting that literacy to work. Pavan Thatha |October 29, 2025