Daniel Smith

77 POSTS1 COMMENTS
Daniel Smith is an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

Darknet 101: An Introduction to The Darkest Places Online

In my last blog, I talked a little about the general principles of the cyberattack marketplace.  Today, we will take a closer look at...

Cyber Attack Marketplace: Where, How, and Why of Purchasing an Attack

Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at...

The Stadium of the Future Is Smart, But Is It Safe? How Hackers Could Target the Super Bowl – And How to Stop It

Levi’s Stadium is one of the most technologically advanced stadiums ever built. It features 12,000 network ports, 1,200 access points, 1,700 beacons, and a DAS...

Turkey DNS Servers Under Attack

Since Monday December 14th, Turkey’s DNS servers, ns1.nic.tr – ns5.nic.tr, have been the target of a persistent denial of service attack. This 40Gbps amplification...

Got Mail? Secure Email Services under Attack around the World

It's been a busy few days here at Radware. Our Emergency Response Team (ERT) has been closely monitoring a series of DDoS-for-Ransom attack campaigns that...

ALERT: OpKillingBay Threats on the Rise

OpKillingBay is a yearly hacktivism operation by Anonymous, activists and other organizations in response to the hunting of whales and dolphins in Japan and...

Portmapper is Preying on Misconfigured Servers to Amplify Attacks

In the constantly evolving threat landscape attackers are always finding new ways to target their victims. In the last few years we have seen...