Radware Threat Researchers Live: DDoS & IoT Botnets By Radware May 20, 2020 6375 In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens "geek out" on what's current in DDoS and IoT Botnets. [You may also like: Who’s Viktor? Tracking down the XTC/Polaris Botnets.]Watch the below clip for an informative deep dive into recent news and research on botnets, a look at URLhaus(*) and what it means to their weekly activities, how these botnets grow and spread, what honeypots are good for, and how this circles back to URLhaus( *).https://youtu.be/iI4rvEfMYMcDownload Radware's “Hackers Almanac” to learn more.Download Now Radware Related Articles Application Protection PCI DSS 4.0 is here. Are you ready? FIGURE 1: "V4.0"On March 31, 2024, we transition from PCI DSS 3.2.1 to PCI DSS 4.0. If this news surprises Uri Dorot |March 14, 2024 Threat Intelligence 2024 Application Threat Trends: From “Hit and Run” To “Low and Slow” As part of Radware’s ongoing threat monitoring, Radware’s CTI team monitors over 26 underground marketplaces used by hackers to illegally trade breached accounts. In those marketplaces, hackers who engage in account takeover attacks sell their freshly breached accounts using ads. Arik Atar |December 11, 2024 Application Protection Cloud Meets On-Premise: A Winning Strategy for Web DDoS Defense In today's digital landscape, organizations face an ever-growing challenge: protecting their web applications from increasingly sophisticated attacks. One particular threat that has been gaining traction is the volumetric DDoS (Distributed Denial of Service) attack targeting web applications, often referred to as Web DDoS. Dalit Bar |September 25, 2024
Application Protection PCI DSS 4.0 is here. Are you ready? FIGURE 1: "V4.0"On March 31, 2024, we transition from PCI DSS 3.2.1 to PCI DSS 4.0. If this news surprises Uri Dorot |March 14, 2024
Threat Intelligence 2024 Application Threat Trends: From “Hit and Run” To “Low and Slow” As part of Radware’s ongoing threat monitoring, Radware’s CTI team monitors over 26 underground marketplaces used by hackers to illegally trade breached accounts. In those marketplaces, hackers who engage in account takeover attacks sell their freshly breached accounts using ads. Arik Atar |December 11, 2024
Application Protection Cloud Meets On-Premise: A Winning Strategy for Web DDoS Defense In today's digital landscape, organizations face an ever-growing challenge: protecting their web applications from increasingly sophisticated attacks. One particular threat that has been gaining traction is the volumetric DDoS (Distributed Denial of Service) attack targeting web applications, often referred to as Web DDoS. Dalit Bar |September 25, 2024