HTTP/2 Continuation Flood In the realm of web security, vulnerabilities within protocols can lead to significant disruptions. The HTTP/2 protocol, while offering enhanced… Pascal Geenens | April 9, 2024
Loop DoS: Datagram Application-Layer Denial of Service Attacks On March 19, 2024, a new threat emerged from the research group of Prof. Dr. Christian Rossow at CISPA Helmholtz… Ward Wrzenski | April 2, 2024
Exploring the Future of AI in Cybersecurity: Risks and Innovations In 2023, a transformative event reshaped the technology landscape: the emergence of artificial intelligence (AI) into the mainstream. Pascal Geenens | March 13, 2024
The MOVEit Transfer Vulnerability: What You Need to Know In today's digital landscape, the security of data transfers is essential. Enterprises globally rely on tools for their data transfer… Radware | June 12, 2023
Rebooting Killnet, a New World Order and the End of the Tesla Botnet In a recent move, KillMilk, the enigmatic figure at the helm of Killnet, disbanded the group's main roster. The sweeping… Pascal Geenens | June 6, 2023
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight… Pascal Geenens | March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest… Shani Czyzyk | March 22, 2023
Exploring Killnet’s Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally… Daniel Smith | January 27, 2023
This was 3rd Quarter 2022 — A Cybersecurity Look Back In the third quarter of 2022, the four universal cyberattack drivers were accounted for: war, religion, politics and money. Pascal Geenens | November 15, 2022
The Four Pillars of a Cybersecurity Strategy That Works Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s defensive posture is… Daniel Smith | June 29, 2022
Radware Threat Researchers Live: Ep.17 Learn about the log4j vulnerability and how a 6-year-old JDNI exploit became urgent overnight. That, and much more Radware | December 17, 2021
Log4Shell: Critical log4j Vulnerability The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library Pascal Geenens | December 14, 2021