Daniel Smith

67 POSTS1 COMMENTS
Daniel Smith is an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

Gaming Companies Beware: Cyber Criminals Are Coming For You, Too

Cyber criminals aren't just targeting gamers, they're also targeting the gaming industry and those that support it at high volumes for profit.

Botnets: DDoS and Beyond

Traditionally, DDoS is an avenue of profit for botherders. But today's botnets have evolved to include several attack vectors other than DDoS that are more profitable. And just as any business-oriented person would do, attackers follow the money.

Are Darknet Take-Downs Effective?

Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs...

Managing Security Risks in the Cloud

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That's...

Here’s How You Can Better Mitigate a Cyberattack

Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build logic chains...

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This...