Radware Threat Researchers Live: DDoS & IoT Botnets By Radware May 20, 2020 6390 In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens "geek out" on what's current in DDoS and IoT Botnets. [You may also like: Who’s Viktor? Tracking down the XTC/Polaris Botnets.] Watch the below clip for an informative deep dive into recent news and research on botnets, a look at URLhaus(*) and what it means to their weekly activities, how these botnets grow and spread, what honeypots are good for, and how this circles back to URLhaus( *). Download Radware's “Hackers Almanac” to learn more. Download Now Radware Related Articles Application Protection ATO Attack Mitigation: How Radware Bot Manager Blocked a Massive Attack Campaign The combination of seamless user experiences and increasing consumer confidence in online transactions has enabled the digital economy to reach unprecedented heights, with millions of consumers adopting online platforms for their shopping or financial needs. Dhanesh Ramachandran |July 30, 2025 Threat Intelligence The Price of Transparency: PoCs, Disclosure and Unsecured Hardware A proof of concept (PoC) is a piece of code or a process designed to demonstrate that a vulnerability is real and exploitable. Ori Meidan |August 19, 2025 Application Protection AI Meets Compliance: Why the EU AI Act Matters to Every Organization Adopting AI AI is quickly becoming core to business operations. Organizations across sectors are adopting AI to improve decision-making, automate workflows, and strengthen cybersecurity. Dan Schnour |August 13, 2025
Application Protection ATO Attack Mitigation: How Radware Bot Manager Blocked a Massive Attack Campaign The combination of seamless user experiences and increasing consumer confidence in online transactions has enabled the digital economy to reach unprecedented heights, with millions of consumers adopting online platforms for their shopping or financial needs. Dhanesh Ramachandran |July 30, 2025
Threat Intelligence The Price of Transparency: PoCs, Disclosure and Unsecured Hardware A proof of concept (PoC) is a piece of code or a process designed to demonstrate that a vulnerability is real and exploitable. Ori Meidan |August 19, 2025
Application Protection AI Meets Compliance: Why the EU AI Act Matters to Every Organization Adopting AI AI is quickly becoming core to business operations. Organizations across sectors are adopting AI to improve decision-making, automate workflows, and strengthen cybersecurity. Dan Schnour |August 13, 2025