Hacktivists Bring OpIsrael Back to Life

Hacktivists Bring OpIsrael Back to Life

Last week, Radware issued a threat alert to highlight the concern that Anonymous operations such as OpIsrael could present a renewed threat to organizations across multiple verticals within the country. This assessment was mainly attributed to the war in Ukraine and geopolitical tensions in and around Israel, spurring a renewed ... Read More
What is Card Testing?

What is Card Testing?

| | Card Testing
Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit card information is valid by making small purchases or attempting to authorize a transaction. The preferred method for card testers is using authorizations, which is less likely to be noticed ... Read More

Exploring Killnet’s Social Circles

It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally a group emerges that is more transparent than others. Examining a criminal organization’s social presence can give analysts valuable insights into the structure and operations of the organization, as well ... Read More
How Information Stealers Get User Credentials

How Information Stealers Get User Credentials

Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the simplicity and depth of this tactic is the Uber breach by threat actor Teapot, which bought the illegally harvested user credentials on the Darknet Marketplace (DNM). The post How Information ... Read More
The Problem of Badly Configured Web Application Firewalls

The Problem of Badly Configured Web Application Firewalls

Web Application Firewalls (WAFs) have become a critical first line of application defense. Yet configuring and managing them in multi-cloud and on-prem hybrid environments can quickly become overwhelming and risky. In the worst case, each cloud ends up with its own WAF tools, a recipe for inconsistency. For instance, one ... Read More
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

| | ddos, security
In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had concluded that while the tools were still relevant, they were not as popular or effective as they used to be due to the evolution of the threat landscape and the ... Read More
The Four Pillars of a Cybersecurity Strategy That Works

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s defensive posture is another. Threat intelligence empowers organizations by providing them with the knowledge and visibility needed to make well-informed decisions about their security defenses and respond faster to current and evolving threats ... Read More
"I actually got canceled for this" Grimes Reflects on 10 Life-Changing Moments | Vanity Fair

Is DDoS a Crime?

The security industry fails to regulate blatant criminal activity, and the nation seems to be rewarding bad behavior with attention. The post Is DDoS a Crime? appeared first on Radware Blog ... Read More

How Will Cyber Threats Impact the Beijing Winter Olympics?

NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games. The post How Will Cyber Threats Impact the Beijing Winter Olympics? appeared first on Radware Blog ... Read More
Radware Threat Researchers Live - ep.12 - Ransom DoS, DarkSide, EA Games, X-DDoS, VMWare vCenter

2021 Year in Review: Denial of Service 

Going into 2022 that DDoS attacks will never disappear from the threat landscape. Attacks do not have to be complex to be effective.  The post 2021 Year in Review: Denial of Service  appeared first on Radware Blog ... Read More