This post is also available in: French German Italian Portuguese (Brazil) Spanish Russian

Daniel Smith

103 POSTS1 COMMENTS
Daniel Smith is an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

2021 Year in Review: Denial of Service 

Going into 2022 that DDoS attacks will never disappear from the threat landscape. Attacks do not have to be complex to be effective. 

Are Offensive Cyber Campaigns Gaining Traction?

In the last year alone, Ransomware attacks have surged, and we have already seen more DDoS attacks at this point in the year than all of 2020.

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created.

Are Decade-Old DoS Tools Still Relevant in 2021?

Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services.

A Look at Digital Attacks on Gaming Resources During the Pandemic

The gaming industry has seen a stark increase in the volume of attacks targeting gaming companies, players and content streamers.

IoT Botnets: Perspectives from a Residential Router

Residential routers face risks from the propagation of IoT botnets and the problem devices present once they are infected.

Digital Threat Actors: Organized Criminals

The internet has provided a new outlet for criminal activity, and this group of threat actors is in it for the money.

Bitcoin and Its Likely Impact on the Threat Landscape

Unfortunately, the projected growth in the value of Bitcoin will likely have a devastating effect on the threat landscape.

5 Cyber Lessons Learned From the U.S. Election

Here are five key cyber-related lessons learned from the 2020 U.S. elections. Hint: It's not always DDoS or foreign actors!

Did Nation-State Attacks Impact the U.S. Elections?

An adversary can interfere with elections via information-based operations or disruptive attacks designed to manipulate voter turnout.