Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight… Pascal Geenens | March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest… Shani Czyzyk | March 22, 2023
Exploring Killnet’s Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally… Daniel Smith | January 27, 2023
This was 3rd Quarter 2022 — A Cybersecurity Look Back The third quarter of 2022 included all four universal cyberattack drivers: war, religion, politics and money. For the third quarter… Pascal Geenens | November 15, 2022
The Four Pillars of a Cybersecurity Strategy That Works Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is… Daniel Smith | June 29, 2022
Radware Threat Researchers Live: Ep.17 Tune in to learn about the log4j vulnerability and how a 6-year-old JDNI exploit became urgent overnight. Our Threat Intelligence… Radware | December 17, 2021
Log4Shell: Critical log4j Vulnerability On December 9, the Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the… Pascal Geenens | December 14, 2021
Radware Threat Researchers Live: Ep.15 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the following: Ransom DoSREvil vs Voice… Radware | October 28, 2021
Radware Threat Researchers Live: Ep.14 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the following: . The Return of… Radware | October 12, 2021
Radware Threat Researchers Live: Episode 12 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss Ransomware, how fast password leaks are… Radware | June 24, 2021
Radware Threat Researchers Live: Episode 10 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith discuss the Emotet clean-up, FluBot the Smishing… Radware | May 21, 2021
The Cyber Threat Alliance – Stopping Attackers in their Tracks When you think about the future of threat intelligence, we can all agree that threats morph, constantly. Sophisticated new botnets,… Jack Sorci | April 16, 2018