Daniel Smith

80 POSTS1 COMMENTS
Daniel Smith is an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

Did Nation-State Attacks Impact the U.S. Elections?

An adversary can interfere with elections via information-based operations or disruptive attacks designed to manipulate voter turnout.

The Issue & Impact of Malspam in the U.S. Elections

Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year.

The U.S. Government’s Response to Election-Related Cyber Threats

The United States is open and vulnerable to misinformation campaigns designed to cause chaos and division amongst citizens.

Be On Alert During Election Season

From disruptive DDoS attacks to influential campaigns, several countries have already experienced election interfering cyberattacks this year.

Digital Attacks on Educational Resources

With closures in response to COVID & the looming threat of additional waves, schools have digitally transformed in ways we never could've imagined.

Hybrid Warfare: How Cancel Culture Can Fuel a War

Countries in conflict are starting rely on a hybrid variation of tactics and techniques, including cyber activity and information/influential campaigns.

K-Pop Fans Are the New Anonymous

Recent cyber events have proven why Anonymous is obsolete, highlighting the need for a new hacktivist group that doesn’t live off the names of the past.

Ghosting Bots: The Story of Hoaxcalls Failures

The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building a botnet campaign.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

DDoS in the Time of COVID-19: Attacks and Raids

While raids are disrupting criminals, they haven't put a dent in the overall activity or economy of the DDoS-as-a-Service industry.