Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joining, Daniel was a member of Radware’s Emergency Response Team (ERT-SOC), where he applied his unique expertise and intimate knowledge of threat actors’ tactics, techniques, and procedures to help develop signatures and mitigate attacks proactively for customers.
Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the simplicity and depth of this tactic is the Uber breach by threat actor Teapot, which bought the illegally harvested user credentials on the Darknet Marketplace (DNM).