<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://www.radware.com/newsevents/mediacoverage/?page=2&amp;rss=Radware-Media-Coverage" rel="self" type="application/rss+xml"/>
<title><![CDATA[Radware: Media Coverage]]></title>
<link><![CDATA[https://www.radware.com/newsevents/mediacoverage/?page=2&amp;rss=Radware-Media-Coverage]]></link>
<description><![CDATA[Latest News]]></description>
<language><![CDATA[en-US]]></language>
<item>
  <title><![CDATA[Bad Memories Still Haunt AI Agents in Dark Reading]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/bad-memories-still-haunt-ai-agents-in-dark-reading/ ]]></link>
  <description><![CDATA[Radware threat researchers demonstrated ways to use indirection prompt injection (IPI) to compromise the connectors used by OpenAI's ChatGPT to link to third-party services]]></description>
  <pubDate>4/23/2026 3:39:42 PM</pubDate>
  <guid>bf0ceb43-44cb-463a-a0f5-f2528ee23af0</guid>
</item><item>
  <title><![CDATA[Radware on AI Security: The Invisible Risks That Can “Stop You in Your Tracks”]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/radware-on-ai-security-the-invisible-risks-that-can-stop-you-in-your-tracks”/ ]]></link>
  <description><![CDATA[Telecom Reseller spoke with Radware’s Chip Witt on AI security risk, focusing on the operational and governance blind spots organizations face as AI adoption accelerates. ]]></description>
  <pubDate>4/21/2026 2:45:55 PM</pubDate>
  <guid>b22786de-efe8-4083-b9dc-cccede074d1b</guid>
</item><item>
  <title><![CDATA[Healthcare IT Today, When Healthcare AI Assistants Go Wrong]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/healthcare-it-today,-when-healthcare-ai-assistants-go-wrong/ ]]></link>
  <description><![CDATA[Large Language Models (LLMs) are being used by AI assistants, introducing new risks, especially if the systems behind them aren’t protected adequately. ]]></description>
  <pubDate>4/17/2026 3:45:01 PM</pubDate>
  <guid>5433e52a-3b93-461e-a5d6-79bf6fa4f927</guid>
</item><item>
  <title><![CDATA[149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle-east-conflict/ ]]></link>
  <description><![CDATA[“The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2,” Radware said in a Tuesday report. The first distributed denial-of-service (DDoS) attack was launched by Hider Nex (aka Tunisian Maskers Cyber Force) on February 28, 2026.]]></description>
  <pubDate>3/8/2026 3:26:11 PM</pubDate>
  <guid>7f587d1f-f1d1-4983-b14a-b6ef0aecf516</guid>
</item><item>
  <title><![CDATA[The internet joins the war]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/the-internet-joins-the-war/ ]]></link>
  <description><![CDATA[Following the launch of the U.S.–Israeli military campaign against Iran on February 28, 2026, a parallel surge of hacktivist activity quickly emerged across the Middle East. According to a report from Radware, within nine hours of the first kinetic strikes under “Operation Epic Fury,” multiple hacktivist groups began launching retaliatory distributed denial-of-service (DDoS) attacks targeting government and critical infrastructure across the region. Between February 28 and March 2, nine hacktivist groups claimed 107 attacks against 81 organizations in eight Middle Eastern countries.]]></description>
  <pubDate>3/5/2026 3:23:19 PM</pubDate>
  <guid>893219b4-c6b3-4ba8-997e-7b2c1e842a9d</guid>
</item><item>
  <title><![CDATA[Israel ranks first worldwide as target of geopolitical cyberattacks]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/israel-ranks-first-worldwide-as-target-of-geopolitical-cyberattacks/ ]]></link>
  <description><![CDATA[Cyberattacks against Israeli organizations have shifted from sporadic disruptions to a near-daily occurrence, with Israel emerging as the world’s most targeted country for geopolitically motivated cyber activity in 2025, according to Radware’s 2026 Global Cyber Threat Report.]]></description>
  <pubDate>2/19/2026 3:21:17 PM</pubDate>
  <guid>2cfa53a2-392e-4b02-82b1-ffef7fee04a6</guid>
</item><item>
  <title><![CDATA[New Radware API Security Platform Targets Real-Time Risk In Modern Cloud Environments - WorldNews]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/new-radware-api-security-platform-targets-real-time-risk-in-modern-cloud-environments-worldnews/ ]]></link>
  <description><![CDATA[Global application security provider Radware has unveiled a new API Security Service aimed at helping enterprises protect one of their most critical—and exposed—digital assets: application programming interfaces.]]></description>
  <pubDate>2/7/2026 3:18:58 PM</pubDate>
  <guid>9ae9f1c5-64b4-4c61-ac57-91b898959fa3</guid>
</item><item>
  <title><![CDATA[Radware Combines AI Agent, LLM Firewall Tools to Give Enterprises, MSSPs a Full AI Security Portfolio]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/radware-combines-ai-agent,-llm-firewall-tools-to-give-enterprises,-mssps-a-full-ai-security-portfoli/ ]]></link>
  <description><![CDATA[Radware is putting in place the tools that enterprises need to protect their businesses and secure their data as they ramp up their adoption of generative AI and AI agents. The vendor in November 2025 took a significant step forward when it rolled out LLM Firewall, an addition to its Cloud Application Protection Services and the first phase of what executives said is a broader agentic protection solution for enterprises and MSSPs.]]></description>
  <pubDate>2/5/2026 3:15:54 PM</pubDate>
  <guid>a2b0d020-b04b-48a7-8d4c-d582d0b047d9</guid>
</item><item>
  <title><![CDATA[Radware targets API blind spots with real-time lifecycle protection - IT Security News]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/radware-targets-api-blind-spots-with-real-time-lifecycle-protection-it-security-news/ ]]></link>
  <description><![CDATA[Radware has unveiled the launch of its Radware API Security Service, an end-to-end solution designed to protect APIs throughout their entire lifecycle using real-time production traffic. Radware API Security Service offers APIs advanced protection against the OWASP Top 10 API Security Risks, including sophisticated Layer 7 DDoS attacks.]]></description>
  <pubDate>1/20/2026 3:12:05 PM</pubDate>
  <guid>cf19fd9e-d347-477c-bc25-47395ac87156</guid>
</item><item>
  <title><![CDATA[ChatGPT falls to new data-pilfering attack as a vicious cycle in AI continues]]></title>
  <link><![CDATA[https://www.radware.com/documents/media-coverage/chatgpt-falls-to-new-data-pilfering-attack-as-a-vicious-cycle-in-ai-continues/ ]]></link>
  <description><![CDATA[There’s a well-worn pattern in the development of AI chatbots. Radware researchers discover a vulnerability and exploit it to do something bad.  Open AI introduces a guardrail that stops the attack from working. Then, Radware researchers devise a simple tweak that once again imperils chatbot users.]]></description>
  <pubDate>1/8/2026 3:10:45 PM</pubDate>
  <guid>709dc468-9861-49d7-91c4-23fdb0620496</guid>
</item></channel>
</rss>
