Radware Threat Researchers Live: DDoS & IoT Botnets By Radware May 20, 2020 6476 In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens "geek out" on what's current in DDoS and IoT Botnets. [You may also like: Who’s Viktor? Tracking down the XTC/Polaris Botnets.]Watch the below clip for an informative deep dive into recent news and research on botnets, a look at URLhaus(*) and what it means to their weekly activities, how these botnets grow and spread, what honeypots are good for, and how this circles back to URLhaus( *).https://youtu.be/iI4rvEfMYMcDownload Radware's “Hackers Almanac” to learn more.Download Now Radware Related Articles Threat Intelligence Hacker Persona Part 2: The Evolution of Gamers into Application Hackers In the first blog, I covered how and why gaming has become the primary source of new application security threat Arik Atar |May 16, 2024 AI and User Experience The Gen AI Revolution: Transforming DDoS Attack Tools In the past, launching a DDoS attack required a certain level of technical expertise. Hackers needed to understand network protocols, identify vulnerabilities, and coordinate the attack from multiple sources. However, with the advent of Gen AI, this landscape has drastically changed. Eva Abergel |August 21, 2024 Application Protection Protecting APIs in the Age of Business Logic Attacks In recent years, how we build and interact with applications has drastically changed. APIs (Application Programming Interfaces) have become the backbone of modern applications, enabling seamless communication between systems and delivering fast, connected experiences to users. Uri Dorot |February 27, 2025
Threat Intelligence Hacker Persona Part 2: The Evolution of Gamers into Application Hackers In the first blog, I covered how and why gaming has become the primary source of new application security threat Arik Atar |May 16, 2024
AI and User Experience The Gen AI Revolution: Transforming DDoS Attack Tools In the past, launching a DDoS attack required a certain level of technical expertise. Hackers needed to understand network protocols, identify vulnerabilities, and coordinate the attack from multiple sources. However, with the advent of Gen AI, this landscape has drastically changed. Eva Abergel |August 21, 2024
Application Protection Protecting APIs in the Age of Business Logic Attacks In recent years, how we build and interact with applications has drastically changed. APIs (Application Programming Interfaces) have become the backbone of modern applications, enabling seamless communication between systems and delivering fast, connected experiences to users. Uri Dorot |February 27, 2025