Digital Threat Actors: Organized Criminals Whenever there is an opportunity or a racket to run, organized criminals will naturally appear. And appear they have over Daniel Smith |February 25, 2021
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target Pascal Geenens |February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit Daniel Smith |February 09, 2023
How Will Cyber Threats Impact the Beijing Winter Olympics? The Olympics is a one-of-a-kind event that garners attention from every corner of the world, digital and in-person. So it Daniel Smith |February 03, 2022
The 2020 App Threats Landscape in Review As more organizations place a priority on application development, production and hosting, new vulnerabilities and threats emerge. The need for Radware |February 03, 2021
Radware Threat Researchers Live: Episode 7 In the latest episode of Radware Threat Researchers Live, Pascal Geenens and Daniel Smith take a deep dive into today's Radware |February 02, 2021
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various Neetu Singh |February 01, 2023
Radware Threat Researchers Live: Ep.17 Tune in to learn about the log4j vulnerability and how a 6-year-old JDNI exploit became urgent overnight.Our Threat Intelligence Researchers Radware |December 17, 2021
Log4Shell: Critical log4j Vulnerability On December 9, the Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the Pascal Geenens |December 14, 2021
Radware Threat Researchers Live: Ep.16 Tune in and watch our special guest Mathieu Huysman, co-founder & COO of Cyrex, an expert penetration tester and ethical Radware |December 13, 2021
How Bots Attack Your Application and Why You Probably Missed It Imagine someone finding a spare key under your home's doormat just by guessing. This is similar to how bot operators take advantage of overlooked application vulnerabilities. Towards the upcoming holidays -I have gathered three hacker tutorials from the Darknet published in the second half of 2024. Arik Atar |December 12, 2024
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District Richard Arneson |December 12, 2022