Daniel Smith

76 POSTS1 COMMENTS
Daniel Smith is an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

Digital Attacks on Educational Resources

With closures in response to COVID & the looming threat of additional waves, schools have digitally transformed in ways we never could've imagined.

Hybrid Warfare: How Cancel Culture Can Fuel a War

Countries in conflict are starting rely on a hybrid variation of tactics and techniques, including cyber activity and information/influential campaigns.

K-Pop Fans Are the New Anonymous

Recent cyber events have proven why Anonymous is obsolete, highlighting the need for a new hacktivist group that doesn’t live off the names of the past.

Ghosting Bots: The Story of Hoaxcalls Failures

The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building a botnet campaign.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

DDoS in the Time of COVID-19: Attacks and Raids

While raids are disrupting criminals, they haven't put a dent in the overall activity or economy of the DDoS-as-a-Service industry.

Expected Technology at the 2020 Olympics in Tokyo

While technology & connected venues are a great achievement, they also create a larger threat landscape that becomes increasingly difficult to defend.

Don’t Get Scammed During the Hypest Moment in History

With the Olympics fast approaching, one thing is for certain: cyber criminals will be looking to profit by targeting unsuspecting spectators

Yet Another Cyber Prediction Blog

Nobody knows what exactly the future will hold for our industry, but strong indicators help us to forecast trends in the coming years with some degree of accuracy.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.