The MOVEit Transfer Vulnerability: What You Need to Know In today's digital landscape, the security of data transfers is essential. Enterprises globally rely on tools for their data transfer… Radware | June 12, 2023
Rebooting Killnet, a New World Order and the End of the Tesla Botnet In a recent move, KillMilk, the enigmatic figure at the helm of Killnet, disbanded the group's main roster. The sweeping… Pascal Geenens | June 6, 2023
India One of the Most Targeted Countries for Hacktivist Groups In the last three months, hacktivists have claimed 480 DDoS attacks targeting Indian websites, making India the most targeted country… Pascal Geenens | May 17, 2023
Hacktivists Bring OpIsrael Back to Life Last week, Radware issued a threat alert to highlight the concern that Anonymous operations such as OpIsrael could present a… Daniel Smith | April 5, 2023
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight… Pascal Geenens | March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest… Shani Czyzyk | March 22, 2023
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target… Pascal Geenens | February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit… Daniel Smith | February 9, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Phishing for 2FA codes is the latest in specialized bots that make it easier and quicker for fraudsters to fool… Neetu Singh | February 1, 2023
Exploring Killnet’s Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally… Daniel Smith | January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District… Richard Arneson | December 12, 2022
What is the W4SP Information Stealer? Since mid-October, W4SP malware is attacking software supply chains; in this case, it's using Python packages to launch an information… Richard Arneson | December 1, 2022