
Rebooting Killnet, a New World Order and the End of the Tesla Botnet
In a recent move, KillMilk, the enigmatic figure at the helm of Killnet, disbanded the group's main roster. The sweeping decision was made as around 50 splinter groups within Killnet, consisting of over 1,250 people, were deviating from the primary objectives of hacktivism. Killnet, however, hasn't ceased to exist. The ... Read More

India One of the Most Targeted Countries for Hacktivist Groups
In the last three months, hacktivists have claimed 480 DDoS attacks targeting Indian websites, making India the most targeted country for hacktivist groups tracked by our Threat Intelligence team. Hacktivist campaigns targeting India have been on the rise due to negative sentiments spread through social media campaigns ... Read More

India One of the Most Targeted Countries for Hacktivist Groups
1 The post India One of the Most Targeted Countries for Hacktivist Groups appeared first on Radware Blog ... Read More

Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression
Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight alteration, Newton's law can be applied to geopolitics: for every action, there will be a more extensive opposite reaction. Newton's geopolitical version of the law can only lead to escalation ... Read More

Dependency Confusion Attacks
In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target the various components that make up a software application, such as libraries and frameworks, to infiltrate and compromise the software. One type of attack that has gained attention in this ... Read More
Software Supply Chain Risks for Low- and No-Code Application Development
Supply chain attacks occur when a third-party vendor or partner with less robust security measures is breached, allowing attackers to indirectly gain access to an organization. This can happen through backdoors planted in software updates, as seen in incidents like SolarWinds and Kaseya. New architectures such as multi-cloud and microservices ... Read More
This was 3rd Quarter 2022 — A Cybersecurity Look Back
In the third quarter of 2022, the four universal cyberattack drivers were accounted for: war, religion, politics and money. The post This was 3rd Quarter 2022 — A Cybersecurity Look Back appeared first on Radware Blog ... Read More
CVE ALERT! OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows
After a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities in its cryptographic library that could trigger crashes or lead to remote code execution (RCE). The post CVE ALERT! OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows appeared first ... Read More

This was H1 2022: Part 3 – Beyond the War
Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget that there is still activity outside the realm of the war. True, the war shifted the focus and priorities of the nations and some crime groups alike, but others went on with ... Read More
This was H1 2022: Part 2 – Cyber War
On February 24, 2022, news broke that Russia had initiated its special military operation against Ukraine. That date, which marked the start of the war, will be engraved in our memories for a long time. Preceding the army movements, cyber operations attributed to the state actors of the Russian nation ... Read More