This post is also available in: French German Italian Portuguese (Brazil) Spanish Russian

Daniel Smith

114 POSTS0 COMMENTS
Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joining, Daniel was a member of Radware’s Emergency Response Team (ERT-SOC), where he applied his unique expertise and intimate knowledge of threat actors’ tactics, techniques, and procedures to help develop signatures and mitigate attacks proactively for customers.

Credential Access via Information Stealers

Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the simplicity and depth of this tactic is the Uber breach by threat actor Teapot, which bought the illegally harvested user credentials on the Darknet Marketplace (DNM).

The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape

In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had concluded that while the...

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers...

Is DDoS a Crime?

The security industry fails to regulate blatant criminal activity, and the nation seems to be rewarding bad behavior with attention.

How Will Cyber Threats Impact the Beijing Winter Olympics?

NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games.

2021 Year in Review: Denial of Service 

Going into 2022 that DDoS attacks will never disappear from the threat landscape. Attacks do not have to be complex to be effective. 

Are Offensive Cyber Campaigns Gaining Traction?

In the last year alone, Ransomware attacks have surged, and we have already seen more DDoS attacks at this point in the year than all of 2020.

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created.

Are Decade-Old DoS Tools Still Relevant in 2021?

Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services.

A Look at Digital Attacks on Gaming Resources During the Pandemic

The gaming industry has seen a stark increase in the volume of attacks targeting gaming companies, players and content streamers.